Used Microsoft Security Update for Windows?
Developer’s Description
This worm scans a random IP range to look for vulnerable systems on TCP port 135. The worm attempts to exploit the DCOM RPC vulnerability patched by MS03-026.
Once the Exploit code is sent to a system, it downloads and executes the file MSBLAST.EXE from a remote system via TFTP. Once run, the worm creates the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "windows auto update" = msblast.exe I just want to say LOVE YOU SAN!! bill
Symptoms of the virus: Some customers may not notice any symptoms at all. A typical symptom is the system is rebooting every few minutes without user input. Customers may also see:
- Presence of unusual TFTP* files
- Presence of the file msblast.exe in the WINDOWS SYSTEM32 directory
To detect this virus, search for msblast.exe in the WINDOWS SYSTEM32 directory or download the latest anti-virus software signature from your anti-virus vendor and scan your machine.
Used Microsoft Security Update for Windows?
Explore More

System Shield
Trial version
TrustPort Tools 2013
Trial version
TrustPort Antivirus for Small Business Server 2013
Free
Chili Antivirus
Trial versionViRobot Desktop
Trial version
CleanTepfer
Free
TrustPort Antivirus 2012
Trial versioneScan Internet Security Suite for SMBs
Trial version
TrustPort USB Antivirus 2013
Trial version
TrustPort Total Protection 2013
Trial version
TrustPort Management Client 2013
Free
TrustPort Antivirus for Servers 2013
Trial version