Category: Malware

Type: Worm

Aliases: Datom, Worm_Win32_Datom, Worm.Win32.Datom


Datom is a network worm. It replicates to shared network resources. The worm consists of 3 different files:


The first component, MSVXD.EXE activates the worm by loading the MSVXD16.DLL library. The MSVXD16.DLL then loads the MSVXD32.DLL component, which spreads the worm.


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

The worm searches for available network resources and tries to connect to their host computers. If the connection has been successfull, the worm then searches for a shared directory that appears to be the Windows directory: it tries the "WinNT" name, and also tries to read the "WinDir" section in the MSDOS.SYS file (if it exists and is available). Then the worm copies all its components to the remote Windows directory, and then sets MSVXD.EXE up to start with Windows automatically: if there is file called "Win.ini" in the remote Windows directory, it writes "MSVXD.EXE" string in the "Run" section of this file, otherwise it creates a link file pointing to MSVXD.exe and called "VxD Manager.lnk" in the common ("All users") Startup directory on the remote computer.

The worm searched for the presence of the ZoneAlarm firewall, and tries to terminate its active instances. It also tries to send "notification" email messages to one of two different addresses that may belong to the author of the worm. These messages contain information about the infected system.