This worm may be downloaded from remote sites by other malware. It may be dropped by other malware.
It propagates by dropping copies of itself in all physical drives. It also drops copies of itself in certain folders that are known to be used by peer-to-peer (P2P) network.s
It drops copies of itself. It drops files/components.
It creates registry entries to enable its automatic execution at every system startup. It uses Windows Task Scheduler to create a scheduled task that executes the dropped copy.
It modifies registry entries to hide files with both System and Read-only attributes. It creates registry key(s)/entry(ies). It modifies registry key(s)/entry(ies) as part of its installation routine.
It drops copies of itself in folders used in peer-to-peer networks.
It drops copies of itself in all physical drives. It drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute dropped copies when the drives are accessed.
It creates mutex(es) to ensure that only one instance of itself is running in memory.
More...