The W32.Opaserv.J.Worm is a variant of the W32.Opaserv.Worm
. It is a network-aware worm that spreads across open network shares. This worm copies itself to the remote computer as a file named Srv32.exe. It is compressed using ASPack. The W32.Opaserv.J.Worm also has Backdoor capabilities.
Indicators of the infection include the existence of:
- The files SrvTsk and SrvRes in the root of drive C. This indicates a local infection; that is, the worm was executed on the local computer.
- The existence of the temp.ini file in the root of drive C. This may indicate a remote infection; that is, the computer was infected by a remote host.
- The existence of the value
Srv32Old <Path\original worm name>
in the registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
When the worm runs on Windows 95/98/Me-based computers, the worm can spread to other Windows 95-/98-/Me-/2000-/NT-/XP-based computers through open network shares, but the worm cannot run on Windows 2000/NT/XP.
If you are on a network, or have a full-time connection to the Internet, such as a DSL or cable modem, you must
disconnect the computer from the network and the Internet before attempting to remove this worm. If you have shared files or folders, disable them. When you have finished the removal procedure, if you decide to re-enable file sharing, Symantec suggests that you do not
share the root of drive C. Instead, share specific folders. These shared folders must be password-protected with a secure password. Do not use a blank password.
Also, before doing so, if you are using Windows 95/98/Me, download and install the Microsoft patch from
Click for a more detailed description of Rapid Release and Daily Certified virus definitions.