Attention: We have transitioned to a new AAD or Microsoft Entra ID from the week of May 20, 2024. In case your tenant requires admin consent, please refer to this document located at Overview of user and admin consent - Microsoft Entra ID | Microsoft Learn and grant access to App ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read for continued access. While the app may appear unverified, you can confirm its legitimacy by verifying the App ID provided.
We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Worm:Win32/Mydoom.B@mm
Detected by Microsoft Defender Antivirus
Aliases: W32/Mydoom.b@MM (McAfee) W32.Mydoom.B@mm (Symantec) WORM_MYDOOM.B (Trend Micro) Win32.Mydoom.B (CA)
Summary
Win32/Mydoom.B@mm is a mass-mailing worm that sends itself to e-mail addresses it finds on the infected computer. The worm also installs a .dll file that acts as a backdoor. After February 1, 2004, the worm attempts a denial-of-service (DoS) attack against www.sco.com.
To manually recover from infection by Win32/Mydoom.B@mm, perform the following steps:
-
Disconnect from the Internet.
-
End the worm process.
-
Delete the worm files from your computer.
-
Delete the worm registry entry.
-
Take steps to prevent re-infection.
Disconnect from the Internet
To ensure that your computer is not actively infecting other computers, you should disconnect it from the Internet before proceeding.
End the worm process
Next you should end the worm process. This will stop your computer from infecting other computers.
To end the worm process
-
Right-click the Taskbar and click Task Manager.
-
Click the Processes tab.
-
On the Processes tab, click Image Name to sort the running processes by name.
-
Select the process taskmon.exe, and then click End Process.
Delete the worm files from your computer
Once you have stopped the worm from running, you should delete the actual worm code off your computer.
To delete the worm files from the hard disk
-
Click Start, and then click Run.
-
In the Open field, type %windir%
-
Press Enter.
-
Click the Name column to sort files by name.
-
If the file taskmon.exe is found, delete it.
This will remove the malicious worm code from your computer.
If deleting files fails, use the following steps to verify that taskmon.exe is not running:
-
Press Ctrl+Alt+Del once.
-
Click Task Manager.
-
Click the Processes tab.
-
Confirm that taskmon.exe is not in the list.
Delete the worm registry entry
To delete the worm registry entry
-
On the Start menu, click Run.
-
Type regedit and click OK.
-
Navigate to the key in the left pane: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
-
In the right pane, right-click the value:
TaskMon <system folder>\taskmon.exe
or
TaskMon %Temp%\taskmon.exe -
Select Delete.
-
Click Yes to delete the value.
-
Repeat step 3 to step 6 for the registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
-
Close the Registry Editor.
Take steps to prevent re-infection
You should not reconnect your computer to the Internet until the computer is protected from re-infection.