The payload of the worm destroys any file with the extension .h, .c, .cpp, .asm, .doc, .ppt, or .xls on the hard disk of the infected computer, any mapped drives, and any network computers that are accessible when it is executed. This continues to occur until the worm is removed.
You may receive the worm as an attachment named Zipped_files.exe . When run, this executable copies itself to the \Windows\System folder with the file name Explore.exe or to the \Windows folder with the file name _setup.exe. The worm modifies Win.ini or the registry so that Explore.exe is executed each time you start Windows.
The worm was first discovered in Israel and submitted to Symantec Security Response on June 6, 1999.
Worm.ExploreZip uses MAPI commands and Microsoft Outlook, Outlook Express, or Exchange on Windows 95/98/NT to propagate itself.
The worm emails itself as an attachment with the file name Zipped_files.exe in reply to unread messages in your inbox. Once the worm responds to a message in your inbox, it marks the message so it will not respond to the message again. Because of this, the messages appear to the recipients to be replies to their messages. The message contains the following text:
Hi <Recipient Name>!
I received your email and
I shall send you a reply
ASAP. Till then, take a
look at the attached
The worm continues to monitor the inbox for new messages and responds accordingly.
Once the attachment is executed, the following message may appear:
The displayed button is the "OK" button and is dependent on the language of the infected operating system. The example shown was taken from a Hebrew language \Windows.
The worm copies itself to the \Windows\System (\System32 on Windows NT) folder with the file name Explore.exe or _setup.exe and also modifies the Win.ini file (Windows 95/98) or the registry (Windows NT) so that the program is executed each time that Windows is started. You may also find this file in the \Windows temporary folder, or the attachments folder, depending on the email program you are using.
Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":