x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF
Active Scan. Scan your PC free
Panda Protection

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Tixcet.A

Threat LevelLow threatDamageHighDistributionNot widespread
Common name:Tixcet.A
Technical name:W32/Tixcet.A.worm
Threat level:Medium
Type:Worm
Effects:  

It deletes files with several extensions (.DOC, .MP3, .MOV, .ZIP, .JPG, among others) and replaces them with a copy of itself, keeping the same name as the original files. It reaches the computer passing itself off as a Word document in order to deceive users and spreads making copies of itself in all the system.

Affected platforms:

Windows 2003/XP/2000/NT/ME/98/95

First detected on:May 23, 2008
Detection updated on:May 27, 2008
StatisticsNo

Brief Description 

    

Tixcet.A is a worm that deletes files with several extensions and replaces them with a copy of itself keeping the same name as the original files. Among the affected extensions are the following: .DOC, .PPT, .MP3, .MOV, .ZIP and .JPG.

Additionally, it does not allow files to be copied, as it disables the option Paste and contents to be copied, as the text that is copied is not the selected by the user but one selected by the worm.

Tixcet.A reaches the computer passing itself off as a Word document in order to deceive users. It spreads making copies of itself in all the system.

Visible Symptoms 

    

Tixcet.A is easy to recognize once it has affected the computer, as it displays the following symptoms:

  • It reaches the computer in a file that has the icon of a Word document, in order to pass itself off as an inoffensive file and deceive users:

  • When it is run, the computer is restarted.
  • It adds the word CETIX to the Notification area, as can be seen in the following image:

 

In order to understand better some of the actions carried out by Tixcet.A, an explanatory video is at your disposal.