Virus Encyclopedia
Welcome to the Virus Encyclopedia of Panda Security.
Encyclopedia
GetVirusCard
True
0
DdonAba.A | |
Threat Level Damage Distribution |
 |
Common name: | DdonAba.A |
Technical name: | W32/DdonAba.A.worm |
Threat level: | Medium |
Type: | Worm |
Effects: | It deletes the files with an MP3 and DOC extension from certain drives. It carries out several modifications in the Windows Registry, which prevent the computer from working properly. It spreads through removable, shared and mapped drives. |
Affected platforms:
|
Windows 2003/XP/2000/NT/ME/98/95 |
First detected on: | June 21, 2008 |
Detection updated on: | June 21, 2008 |
Statistics | No |
Proactive protection: | Yes, using TruPrevent Technologies
|
Brief Description | |
Autocrat.A is a worm that deletes the files with an MP3 and DOC extension from the drives available from the letter F: on. Additionally, it carries out several modifications in the Windows Registry, which prevent the user from carrying out the following actions, among others: - Viewing the processes that are being run through the Task Manager.
- Modifying the configuration of the features of the folders.
DdonAba.A spreads through removable, shared and mapped drives, making copies of itself in them. |
Visible Symptoms | |
DdonAba.A is easy to recognize, as it displays the following symptoms: - It reaches the computer in a file the icon of a dog, like the following:
 - When it is run, it opens the root directory of the C: drive. In this directory it creates a file which belongs to the following image:

|