I-Worm.Recory
Worm Recory spreads in the Internet by several ways. Usually, it comes in infected letters with executable attachments. When a user executes such attachment, the worm installs itself to the computer. Then it infects popular file-sharing applications and IRC clients and spreads using this software. For distributing itself by e-mail it uses Microsoft Outlook mail application and addresses obtained in the Address Book. The worm can look like an antivirus utility and can trick a user into installing it.
File System Modifications
- The following files were created in the system:
# File Name 1 i-worm.recory.exe
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.