We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Worm:Win32/Sasser.A
Aliases: W32/Sasser.worm (McAfee) W32.Sasser.Worm (Symantec) WORM_SASSER.A (Trend Micro) Win32.Sasser.A (CA) Sasser (F-secure) Sasser.A (Panda) W32/Sasser-A (Sophos) Worm.Win32.Sasser.15872 (Global Hauri) W32/Sasser.A (Norman)
Summary
- Disconnect from the Internet
- End the worm process
- Delete the worm files from your computer
- Delete the worm registry entry
- Take steps to prevent re-infection
Disconnect from the Internet
End the worm process
- Press CTRL+ALT+DEL once and click Task Manager.
- Click Processes and click Image Name to sort the running processes by name.
- Select the process avserve.exe, and click End Process.
- Repeat step 3 for any additional processes named avserve.exe and any processes named <random number>_up.exe (for example 8843_up.exe).
Delete the worm files from the computer
To delete the worm files from the hard disk
- Click Start, and click Run.
- In the Open field, type %windir%
- Click OK.
- Click Name to sort files by name.
- If avserve.exe is in the list, delete it.
- Repeat step 5 for any additional processes named avserve.exe and any processes named <random number>_up.exe (for example 8843_up.exe), if found.
- On the Desktop, right-click the Recycle Bin and click Empty Recycle Bin.
- Click Yes.
- Press CTRL+ALT+DEL once and click Task Manager.
- Click Processes and click Image Name to sort the running processes by name.
- Confirm that avserve.exe is not in the list.
Delete the worm registry entry
- On the Start menu, click Run.
- Type regedit and click OK.
- In the left pane, navigate to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
In the right pane, right-click the value avserve.exe, if it exists.
Click Delete and click Yes to delete the value. - Close the Registry Editor.
Restart your computer
- On the Start menu, click Shut Down.
- Select Restart from the drop-down list and click OK.