x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF
Active Scan. Scan your PC free
Panda Protection

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Hoots.A

Threat LevelModerate threatDamageHighDistributionNot widespread

Effects 

Hoots.A has no destructive efects. It just sends the following image to the local network printers:

Infection strategy 

Hoots.A creates one of the following files:

  • O RLY.EXE in the Startup directory. This way, it ensures that it is run whenever Windows is started.
  • CHECK.EXE in the C: drive.

These files are copies of the worm.

Means of transmission 

Transmission through shared resources and mapped drives.

If the affected computer is connected to a network, Hoots.A carries out the following actions:

  • It attempts to gain access to shared network drives. In order to do this, it uses passwords that are commonly-used or easy to guess. If successful, it copies itself to the shared drives.
  • It draws up an inventory of all the mapped network drives and creates a copy of itself in all of them.

Further Details  

Hoots.A is written the programming language Visual Basic. This worm is 380,928 bytes in size.