Active Scan. Scan your PC free
Download Cloud Antivirus Gratis

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.


Threat LevelLow threatDamageHighDistributionNot widespread


P2PWorm.JM spreads to other computers by copying its code to other files or programs. It has damaging effects on the affected computer.


It avoids being detected by the user by using the following techniques:
  • Techniques included in its code to hide its files and processes while it is active.
  • It injects itself into running processes so that no unusual processes are seen.


It causes a loss of productivity in the local network to which the compromised computer belongs:

  • It generates a large amount of network activity and consumes bandwidth.


Means of transmission 

Propagation through the exploits of remote vulnerabilities:

P2PWorm.JM carries out the following process:

  • It spreads by attacking IP addresses obtained at random or from the network to which the infected computer belongs.
  • It tries to access the IP addresses under attack by exploiting an existing vulnerability or through an open port.
  • If it does this, it downloads a copy of itself onto the vulnerable computer.


Propagation through P2P programs:

P2PWorm.JM carries out the following process:

  • It makes copies of itself in shared folders belonging to these programs.
  • Other users of these programs can remotely access these shared folders. So, they voluntarily download onto their computer files created by P2PWorm.JM in the belief that they are useful or interesting applications, movies, images, etc. In fact, they are downloading copies of P2PWorm.JM onto their computers.
  • When they run the downloaded file, these computers will be affected by P2PWorm.JM.


Further Details  

P2PWorm.JM has the following additional characteristics:

  • It is 154112 bytes in size.