Tillbaka till svenska Fidonet
English   Information   Debug  
COMICS   0/15
CONSPRCY   0/899
COOKING   32953
COOKING_OLD1   0/24719
COOKING_OLD2   0/40862
COOKING_OLD3   0/37489
COOKING_OLD4   0/35496
COOKING_OLD5   9370
C_ECHO   0/189
C_PLUSPLUS   0/31
DIRTY_DOZEN   0/201
DOORGAMES   0/2061
DOS_INTERNET   0/196
duplikat   6002
ECHOLIST   0/18295
EC_SUPPORT   12/318
ELECTRONICS   0/359
ELEKTRONIK.GER   1534
ENET.LINGUISTIC   0/13
ENET.POLITICS   0/4
ENET.SOFT   0/11701
ENET.SYSOP   33903
ENET.TALKS   0/32
ENGLISH_TUTOR   0/2000
EVOLUTION   0/1335
FDECHO   0/217
FDN_ANNOUNCE   0/7068
FIDONEWS   24128
FIDONEWS_OLD1   0/49742
FIDONEWS_OLD2   0/35949
FIDONEWS_OLD3   0/30874
FIDONEWS_OLD4   0/37224
FIDO_SYSOP   12852
FIDO_UTIL   0/180
FILEFIND   0/209
FILEGATE   0/212
FILM   0/18
FNEWS_PUBLISH   4408
FN_SYSOP   41679
FN_SYSOP_OLD1   71952
FTP_FIDO   0/2
FTSC_PUBLIC   0/13599
FUNNY   0/4886
GENEALOGY.EUR   0/71
GET_INFO   105
GOLDED   0/408
HAM   0/16070
HOLYSMOKE   0/6791
HOT_SITES   0/1
HTMLEDIT   0/71
HUB203   466
HUB_100   264
HUB_400   39
HUMOR   0/29
IC   0/2851
INTERNET   0/424
INTERUSER   0/3
IP_CONNECT   719
JAMNNTPD   0/233
JAMTLAND   0/47
KATTY_KORNER   0/41
LAN   0/16
LINUX-USER   0/19
LINUXHELP   0/1155
LINUX   0/22093
LINUX_BBS   0/957
mail   18.68
mail_fore_ok   249
MENSA   0/341
MODERATOR   0/102
MONTE   0/992
MOSCOW_OKLAHOMA   0/1245
MUFFIN   0/783
MUSIC   0/321
N203_STAT   926
N203_SYSCHAT   313
NET203   321
NET204   69
NET_DEV   0/10
NORD.ADMIN   0/101
NORD.CHAT   0/2572
NORD.FIDONET   189
NORD.HARDWARE   0/28
NORD.KULTUR   0/114
NORD.PROG   0/32
NORD.SOFTWARE   0/88
NORD.TEKNIK   0/58
NORD   0/453
OCCULT_CHAT   0/93
OS2BBS   0/787
OS2DOSBBS   0/580
OS2HW   0/42
OS2INET   0/37
OS2LAN   0/134
OS2PROG   0/36
OS2REXX   0/113
OS2USER-L   207
OS2   0/4786
OSDEBATE   0/18996
PASCAL   0/490
PERL   0/457
PHP   0/45
POINTS   0/405
POLITICS   0/29554
POL_INC   0/14731
PSION   103
R20_ADMIN   1121
R20_AMATORRADIO   0/2
R20_BEST_OF_FIDONET   13
R20_CHAT   0/893
R20_DEPP   0/3
R20_DEV   399
R20_ECHO2   1379
R20_ECHOPRES   0/35
R20_ESTAT   0/719
R20_FIDONETPROG...
...RAM.MYPOINT
  0/2
R20_FIDONETPROGRAM   0/22
R20_FIDONET   0/248
R20_FILEFIND   0/24
R20_FILEFOUND   0/22
R20_HIFI   0/3
R20_INFO2   3221
R20_INTERNET   0/12940
R20_INTRESSE   0/60
R20_INTR_KOM   0/99
R20_KANDIDAT.CHAT   42
R20_KANDIDAT   28
R20_KOM_DEV   112
R20_KONTROLL   0/13273
R20_KORSET   0/18
R20_LOKALTRAFIK   0/24
R20_MODERATOR   0/1852
R20_NC   76
R20_NET200   245
R20_NETWORK.OTH...
...ERNETS
  0/13
R20_OPERATIVSYS...
...TEM.LINUX
  0/44
R20_PROGRAMVAROR   0/1
R20_REC2NEC   534
R20_SFOSM   0/340
R20_SF   0/108
R20_SPRAK.ENGLISH   0/1
R20_SQUISH   107
R20_TEST   2
R20_WORST_OF_FIDONET   12
RAR   0/9
RA_MULTI   106
RA_UTIL   0/162
REGCON.EUR   0/2056
REGCON   0/13
SCIENCE   0/1206
SF   0/239
SHAREWARE_SUPPORT   0/5146
SHAREWRE   0/14
SIMPSONS   0/169
STATS_OLD1   0/2539.065
STATS_OLD2   0/2530
STATS_OLD3   0/2395.095
STATS_OLD4   0/1692.25
SURVIVOR   0/495
SYSOPS_CORNER   0/3
SYSOP   0/84
TAGLINES   0/112
TEAMOS2   0/4530
TECH   0/2617
TEST.444   0/105
TRAPDOOR   0/19
TREK   0/755
TUB   0/290
UFO   0/40
UNIX   0/1316
USA_EURLINK   0/102
USR_MODEMS   0/1
VATICAN   0/2740
VIETNAM_VETS   0/14
VIRUS   0/378
VIRUS_INFO   0/201
VISUAL_BASIC   0/473
WHITEHOUSE   0/5187
WIN2000   0/101
WIN32   0/30
WIN95   0/4288
WIN95_OLD1   0/70272
WINDOWS   0/1517
WWB_SYSOP   0/419
WWB_TECH   0/810
ZCC-PUBLIC   0/1
ZEC   4

 
4DOS   0/134
ABORTION   0/7
ALASKA_CHAT   0/506
ALLFIX_FILE   0/1313
ALLFIX_FILE_OLD1   0/7997
ALT_DOS   0/152
AMATEUR_RADIO   0/1039
AMIGASALE   0/14
AMIGA   0/331
AMIGA_INT   0/1
AMIGA_PROG   0/20
AMIGA_SYSOP   0/26
ANIME   0/15
ARGUS   0/924
ASCII_ART   0/340
ASIAN_LINK   0/651
ASTRONOMY   0/417
AUDIO   0/92
AUTOMOBILE_RACING   0/105
BABYLON5   0/17862
BAG   135
BATPOWER   0/361
BBBS.ENGLISH   0/382
BBSLAW   0/109
BBS_ADS   0/5290
BBS_INTERNET   0/507
BIBLE   0/3563
BINKD   0/1119
BINKLEY   0/215
BLUEWAVE   0/2173
CABLE_MODEMS   0/25
CBM   0/46
CDRECORD   0/66
CDROM   0/20
CLASSIC_COMPUTER   0/378
Möte DIRTY_DOZEN, 201 texter
 lista första sista föregående nästa
Text 131, 849 rader
Skriven 2006-08-05 15:15:00 av KURT WISMER (1:123/140)
Ärende: News, August 5 2006
===========================
[cut-n-paste from sophos.com]

Name   Troj/Agent-CIQ

Type  
    * Trojan

Affected operating systems  
    * Windows

Side effects  
    * Deletes files off the computer
    * Drops more malware
    * Installs itself in the Registry

Aliases  
    * Trojan.Win32.Agent.rb
    * TROJ_AGENT.CDV

Prevalence (1-5) 2

Description
Troj/Agent-CIQ is a Trojan for the Windows platform.

Advanced
Troj/Agent-CIQ is a Trojan for the Windows platform.

Troj/Agent-CIQ may attempt to delete files.

When first run Troj/Agent-CIQ copies itself to <System>\VKTServ.exe 
and creates the following files:

<System>\drivers\ksdt1983.sys - detected by Sophos as Troj/RKProc-G
<System>\svchost.bat - this file may be deleted.

The file KSDT1983.sys is registered as a new system driver service 
named "KSDT1983", with a display name of "KSDT1983". Registry entries 
are created under:

HKLM\SYSTEM\CurrentControlSet\Services\KSDT1983\

The file VKTServ.exe is registered as a new system driver service 
named "VKTServ", with a display name of "VKTServ" and a startup type 
of automatic, so that it is started automatically during system 
startup. Registry entries are created under:

HKLM\SYSTEM\CurrentControlSet\Services\VKTServ\





Name   Troj/Banker-DAG

Type  
    * Spyware Trojan

Affected operating systems  
    * Windows

Side effects  
    * Steals credit card details
    * Installs itself in the Registry

Prevalence (1-5) 2

Description
Troj/Banker-DAG is an internet banking Trojan for the Windows platform.

Troj/Banker-DAG includes functionality to send notification messages 
to remote locations.

Advanced
Troj/Banker-DAG is an internet banking Trojan for the Windows platform.

Troj/Banker-DAG includes functionality to send notification messages 
to remote locations.

When Troj/Banker-DAG is installed the following files are created:

<Windows>\Expert_Corp.exe - detected as Troj/Banker-DAG
<Windows>\Windows.ini - harmless

The following registry entry is created to run Expert_Corp.exe on 
startup:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

<Windows>\Expert_Corp.exe





Name   Troj/Zapchas-BX

Type  
    * Trojan

Affected operating systems  
    * Windows

Side effects  
    * Allows others to access the computer
    * Drops more malware
    * Leaves non-infected files on computer

Aliases  
    * Backdoor.IRC.Zapchast
    * IRC/Zapchast.J
    * IRC/Zapchast.H

Prevalence (1-5) 2

Description
Troj/Zapchas-BX is an mIRC-based backdoor Trojan for the Windows 
platform.

Advanced
Troj/Zapchas-BX is an mIRC-based backdoor Trojan for the Windows 
platform.

Troj/Zapchas-BX creates the following files in the C:\Windows\system\ 
folder:

fullname.txt
ident.txt
nicks.txt
aliases.ini
control.ini
mirc.ini
remote.ini
script.ini
servers.ini
users.ini
sup.bat
svchost.exe
download\
logs\
sounds\
mirc.ico
sup.reg
popups.txt
yaddress.ico
You Have Been HaCkeD By Me.jpg

svchost.exe is the mIRC application, infected with W32/Parite-B. 
script.ini is also detected as Troj/Zapchas-BX. The remaining files 
are harmless.

After these files have been installed, svchost.exe is executed, 
causing it to connect to a preconfigured IRC server and join a 
channel in which a remote attacker can control the infected computer.





Name   Troj/Adclick-CT

Type  
    * Trojan

Affected operating systems  
    * Windows

Side effects  
    * Drops more malware
    * Installs itself in the Registry

Aliases  
    * not-virus:Hoax.Win32.Renos.dy
    * New

Prevalence (1-5) 2

Description
Troj/AdClick-CT is a Trojan for the Windows platform.

Troj/AdClick-CT includes functionality to access the internet and 
communicate with a remote server via HTTP.

Advanced
Troj/AdClick-CT is a Trojan for the Windows platform.

Troj/AdClick-CT includes functionality to access the internet and 
communicate with a remote server via HTTP.

When Troj/AdClick-CT is installed it creates the file 
<CurrentFolder>\pmmon.exe. This file is also detected as 
Troj/AdClick-CT.

The following registry entry is created to run Troj/AdClick-CT on 
startup:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\explorer\run
pmsngr.exe
<pathname of the Trojan executable>

Registry entries are also created under:

HKCU\Software\Internet Security\

When run, Troj/AdClick-CT may display the following messages:
"Please read this message carefully.
System detected virus activities. Your computer may be infected with 
spyware
or potentially other unwanted software if you see more pop-up 
advertisements,
if your settings have changed, or if your Web browser contains 
additional
components that you don't remember downloading.Click "OK" to help 
protect your
computer from spyware by downloading antivirus software packages that 
include
anti-spyware components."

"Errors found:
- Your computer has slowed down.
- Your Internet connection speed has decreased.
- You get popups and annoying ads when you're online or sometimes 
even offline
- Your default home page has been changed to the one you didn't ask for

These are true signs that you may have spyware or other unwanted 
software installed on your computer.
'Click "OK" to download spyware scan and protect your computer from 
spyware."

"Please read this message carefully.
Your PC is infected by spyware. Spyware and other unwanted software 
refers to
programs that perform certain tasks on your computer, typically 
without your
consent. This can include installing pop-up advertising or collecting 
your
ppersonal information. Anti-spyware tools can only help rid your 
computer of
spyware.
Click "OK" to get software and special offers on antivirus software."

The Trojan also tries to connect to the internet and displays 
websites that claim to sell anti-malware products.





Name   Troj/Countof-B

Type  
    * Spyware Trojan

Affected operating systems  
    * Windows

Side effects  
    * Steals information

Aliases  
    * Trojan-Spy.Win32.Agent.kg
    * W32/Agent.AUJ
    * Spy-Agent.am

Prevalence (1-5) 2

Description
Troj/Countof-B is a Trojan for the Windows platform.

Troj/Countof-B collects details about the infected computer and sends 
them to a preconfigured host via HTTP form submission.

Advanced
Troj/Countof-B is a Trojan for the Windows platform.

Troj/Countof-B collects details about the infected computer and sends 
them to a preconfigured host via HTTP form submission.

Information collected by the Trojan includes the versions of various 
installed applications, the type of network connection and the 
specifications of attached hardware.





Name   Troj/Zlob-QC

Type  
    * Trojan

Affected operating systems  
    * Windows

Side effects  
    * Installs itself in the Registry

Aliases  
    * Trojan-Downloader.Win32.Zlob.yt

Prevalence (1-5) 2

Description
Troj/Zlob-QC is a Trojan for the Windows platform.

Advanced
Troj/Zlob-QC is a Trojan for the Windows platform.

When Troj/Zlob-QC is installed the following files are created:

<current folder>\isaddon.dll
<current folder>\isamini.exe

The following registry entry is created to run Troj/Zlob-QC on startup:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\explorer\run
homepage.monitor.exe
<pathname of the Trojan executable>

Troj/Zlob-QC changes search settings for Microsoft Internet Explorer 
by modifying values under:

HKCU\Software\Microsoft\Internet Explorer\Search\





Name   W32/Medbot-B

Type  
    * Worm

How it spreads  
    * Network shares

Affected operating systems  
    * Windows

Side effects  
    * Installs itself in the Registry

Aliases  
    * BackDoor-CMQ

Prevalence (1-5) 2

Description
W32/Medbot-B is a multi-component worm for the Windows platform.

W32/Medbot-B may attempt to create a service called "Windows Log".

W32/Medbot-B may attempt to spread to unprotected netshares.





Name   Troj/Dloadr-AKY

Type  
    * Trojan

Affected operating systems  
    * Windows

Side effects  
    * Downloads code from the internet

Aliases  
    * Trojan-Downloader.Win32.Agent.asf
    * Downloader-AAP

Prevalence (1-5) 2

Description
Troj/Dloadr-AKY is a Trojan for the Windows platform.

Troj/Dloadr-AKY includes functionality to access the internet and 
communicate with a remote server via HTTP.

Troj/Dloadr-AKY may arrive as an attachment to an email with the 
following characteristics:

From address: "Ebay.de" <endofitem@ebay.de>

Subject line: eBay International AG Rechnung vom 01 Juli 2006

Message body:
Sie sind fur das Lastschriftverfahren angemeldet. Der Rechnungsbetrag
wird innerhalb der nachsten funf bis sieben Tage von Ihrem
Bankkonto abgebucht. (Der Abbuchungsbetrag kann von Ihrem
Rechnungsbetrag abweichen, wenn Sie im Zeitraum zwischen der
Rechnungserstellung und dem Abbuchungsdatum Zahlungen geleistet oder
Gutschriften erhalten haben.)

Attachment filename: ebay.de-rechnung.pdf.exe





Name   Troj/Banker-DBA

Type  
    * Spyware Trojan

Affected operating systems  
    * Windows

Side effects  
    * Steals credit card details
    * Steals information
    * Installs itself in the Registry
    * Leaves non-infected files on computer

Aliases  
    * Trojan-Spy.Win32.Banker.axc
    * TSPY_BANKER.DMN
    * Win32/Spy.Banker.NNU

Prevalence (1-5) 2

Description
Troj/Banker-DBA is a Trojan for the Windows platform.

Troj/Banker-DBA includes functionality to send notification messages 
to remote locations.

Advanced
Troj/Banker-DBA is a Trojan for the Windows platform.

Troj/Banker-DBA includes functionality to send notification messages 
to remote locations.

When first run Troj/Banker-DBA copies itself to 
<Windows>\Expert_Corp.exe and creates the file <Windows>\Windows.ini.

The file windows.ini is a simply text file, not malicious, and can be 
deleted.

The following registry entry is created to run Expert_Corp.exe on 
startup:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

<Windows>\Expert_Corp.exe





Name   Troj/Zlob-QF

Type  
    * Trojan

Affected operating systems  
    * Windows

Side effects  
    * Installs itself in the Registry
    * Modifies browser settings
    * Installs a browser helper object

Aliases  
    * Win32/TrojanDownloader.Zlob.SA

Prevalence (1-5) 2

Description
Troj/Zlob-QF is a Trojan for the Windows platform.

Troj/Zlob-QF changes search settings for Microsoft Internet Explorer.

Advanced
Troj/Zlob-QF is a Trojan for the Windows platform.

When Troj/Zlob-QF is installed the following files are created:
<System>\issearch.exe
<System>\ixt0.dll

The following registry entry is created to run issearch.exe on startup:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\explorer\run
issearch.exe
issearch.exe

The file ixt0.dll is registered as a COM object and Browser Helper 
Object (BHO) for Microsoft Internet Explorer, creating registry 
entries under:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser 
Helper Objects\(7fcf04b6-6354-47ef-b45e-a48268e92757)
HKCR\CLSID\(7fcf04b6-6354-47ef-b45e-a48268e92757)

Troj/Zlob-QF changes search settings for Microsoft Internet Explorer 
by modifying values under:

HKCU\Software\Microsoft\Internet Explorer\Search\





Name   W32/Tilebot-GE

Type  
    * Worm

How it spreads  
    * Network shares
    * Chat programs
    * Peer-to-peer

Affected operating systems  
    * Windows

Side effects  
    * Allows others to access the computer
    * Reduces system security
    * Installs itself in the Registry

Aliases  
    * Backdoor.Win32.SdBot.aqj

Prevalence (1-5) 2

Description
W32/Tilebot-GE is an internet worm and IRC backdoor for the Windows 
platform.

W32/Tilebot-GE spreads to other network computers by exploiting 
common buffer overflow vulnerabilities, including: LSASS (MS04-011), 
RPC-DCOM (MS04-012), WKS MS03-049) (CAN-2003-0812), PNP (MS05-039) 
and ASN.1 (MS04-007) and by copying itself to network shares.

W32/Tilebot-GE runs continuously in the background, providing a 
backdoor server which allows a remote intruder to gain access and 
control over the computer via IRC channels.

Advanced
W32/Tilebot-GE is an internet worm and IRC backdoor for the Windows 
platform.

W32/Tilebot-GE spreads to other network computers by exploiting 
common buffer overflow vulnerabilities, including: LSASS (MS04-011), 
RPC-DCOM (MS04-012), WKS MS03-049) (CAN-2003-0812), PNP (MS05-039) 
and ASN.1 (MS04-007) and by copying itself to network shares.

W32/Tilebot-GE runs continuously in the background, providing a 
backdoor server which allows a remote intruder to gain access and 
control over the computer via IRC channels.

When W32/Tilebot-GE is first run, it copies itself to 
<Windows>\win325b.exe.

The file win325b.exe is registered as a new service named 
"win32socket", with a display name of "win32 socket and a startup 
type of automatic, so that it is started automatically during system 
startup. Registry entries are created under:

HKLM\SYSTEM\CurrentControlSet\Services\win32socket\

The worm creates the clean file \drivers\oreans32.sys . This file 
oreans32.sys is registered as a new service named "oreans32", with a 
display name of "oreans32".

Registry entries are created under:

HKLM\SYSTEM\CurrentControlSet\Services\oreans32\

Registry entries are set as follows, affecting system security:

HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N

HKLM\SOFTWARE\Microsoft\Security Center
AntiVirusOverride
1

HKLM\SOFTWARE\Microsoft\Security Center
FirewallOverride
1

HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1

HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry
Start
4

HKLM\SYSTEM\CurrentControlSet\Services\TlntSvr
Start
4

HKLM\SYSTEM\CurrentControlSet\Services\wscsvc
Start
4





Name   W32/IRCBot-QU

Type  
    * Worm

Affected operating systems  
    * Windows

Side effects  
    * Allows others to access the computer
    * Installs itself in the Registry

Aliases  
    * Backdoor.Win32.IRCBot.qu

Prevalence (1-5) 2

Description
W32/IRCBot-QU is a worm for the Windows platform.

When first run W32/IRCBot-QU copies itself to <System>\vmmon32.exe.

Advanced
W32/IRCBot-QU is a worm for the Windows platform.

When first run W32/IRCBot-QU copies itself to <System>\vmmon32.exe.

The following registry entries are created to run vmmon32.exe on 
startup:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Printer
<System>\vmmon32.exe

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Printer
<System>\vmmon32.exe

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Printer
<System>\vmmon32.exe

Registry entries are set as follows:

HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N

HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1





Name   Troj/Tfactory-A

Type  
    * Trojan

Affected operating systems  
    * Windows

Side effects  
    * Downloads code from the internet
    * Installs itself in the Registry
    * Leaves non-infected files on computer
    * Downloads updates
    * Installs a browser helper object

Aliases  
    * not-virus:Hoax.Win32.Renos.dm

Prevalence (1-5) 2

Description
Troj/Tfactory-A is a Trojan which claims to remove spyware and adware 
from the computer.

Troj/Tfactory-A sets various registry entries and downloads various 
dummy files, so that it can then report these dummy installations of 
spyware and adware, in an attempt to coerce users into buying spyware 
and adware removal software.

Advanced
Troj/Tfactory-A is a Trojan which claims to remove spyware and adware 
from the computer.

Troj/Tfactory-A sets various registry entries and downloads various 
dummy files, so that it can then report these dummy installations of 
spyware and adware, in an attempt to coerce users into buying spyware 
and adware removal software.

Troj/Tfactory-A displays popup messages with text such as:

'This notice is brought to you by Windows Security Center.'
'Download spyware remover now and run full system scan to remove 
trojans, viruses and spyware from your PC...'
'Your computer running slower than usual! It maybe infected with 
dangerous spyware or adware. Full system scan is highly recommended 
to remove possible malicious spyware from your computer.'
'Windows Security Center - Alert!'
'Windows Security Center has detected spyware activity on your 
computer! Click here to remove spyware...'
'Click here to remove spyware and adware from your computer 
immediately...'
'Click to remove spyware and adware from your computer...'
'Click here to remove spyware, adware, trojans and viruses from your 
computer...'
'Protect your computer. Download spyware remover to remove spyware 
and protect your data and privacy.'
'Windows has detected spyware on your computer! Full system scan is 
highly recommended to remove spyware.'
'Danger! Spyware activity detected on your computer...'

Troj/Tfactory-A installs itself as follows:

<System>\office_pnl.dll
<System>\officescan.exe
<System>\smartdrv.exe
<System>\winblsrv.dll

Troj/Tfactory-A downloads and installs the following additional files:

<Windows>\bg_bg.gif
<Windows>\big_red_x.gif
<Windows>\buy_now.gif
<Windows>\click_for_free_scan.gif
<Windows>\close_ico.gif
<Windows>\download.gif
<Windows>\download_product.gif
<Windows>\free_scan_red_btn.gif
<Windows>\icon_warning_big.gif
<Windows>\infected.gif
<Windows>\infected_top_bg.gif
<Windows>\logo.gif
<Windows>\navibar_bg.gif
<Windows>\navibar_corner_left.gif
<Windows>\navibar_corner_right.gif
<Windows>\product_box.gif
<Windows>\red_warning_ico.gif
<Windows>\remove_spyware_header.gif
<Windows>\safe_and_trusted.gif
<Windows>\spyware_detected.gif
<Windows>\win_logo.gif
<Windows>\yellow_warning_ico.gif
<Windows>\alexaie.dll
<Windows>\alxie328.dll
<Windows>\alxtb1.dll
<Windows>\BTGrab.dll
<Windows>\dlmax.dll
<Windows>\Pynix.dll
<Windows>\susp.exe
<Windows>\ZServ.dll
<System>\mshtml32.tdb
<System>\a.exe
<System>\alxres.dll
<System>\bridge.dll
<System>\dailytoolbar.dll
<System>\jao.dll
<System>\questmod.dll
<System>\runsrv32.dll
<System>\runsrv32.exe
<System>\smaexp32.dll
<System>\tcpservice2.exe
<System>\txfdb32.dll
<System>\udpmod.dll
<System>\winlogon.ini
<System>\wstart.dll

The file office_pnl.dll is registered as a COM object and Browser 
Helper Object (BHO) for Microsoft Internet Explorer, creating 
registry entries under:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser 
Helper Objects\{B53455DB-5527-4041-AC41-F86E6947AA47}
HKCR\TypeLib\{8B076501-1D1B-4B26-9492-FDB8EEE00D7F}
HKCR\office_pnl.office_panel
HKCR\Interface\{900FBC20-6AEE-4E05-ABA9-AC46E309C029}
HKCR\CLSID\{B53455DB-5527-4041-AC41-F86E6947AA47}

Troj/Tfactory-A sets the following registry entries:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Adware.Srv32
<System>\runsrv32.exe

HKCU\Software\Microsoft\Windows\CurrentVersion\Runonce\Srv32 spool 
service
Adware.Srv32
<no value>

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Srv32 spool 
service
Adware.Srv32
<no value>

HKCR\AppID\WStart.DLL
WStart
wstart.dll

HKCR\AppID\DailyToolbar.DLL
DailyToolbar
dailytoolbar.dll

HKCR\AppID\{F6BDB4E5-D6AA-4D1F-8B67-BCB0F2246E21}
(Default)
<no value>

HKCR\AppID\{951B3138-AE8E-4676-A05A-250A5F111631}
(Default)
<no value>

Troj/Tfactory-A creates the following registry entries:

HKLM\SOFTWARE\Transponder
HKLM\SOFTWARE\Software\TPS108
HKLM\SOFTWARE\RespondMiter
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\bridge
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Alexa Toolbar
HKCU\Software\Microsoft\IPCheck
HKLM\SOFTWARE\WSoft
HKLM\SOFTWARE\NIX Solutions\DailyToolbar
HKLM\SOFTWARE\DailyToolbar
HKLM\SOFTWARE\Alexa Toolbar
HKLM\SOFTWARE\Alexa Internet
HKCR\WStart.WHttpHelper.1
HKCR\WStart.WHttpHelper
HKCR\url_relpacer.URLResolver
HKCR\Popup.PopupKiller
HKCR\Popup.HTMLEvent.
HKCR\PopMenu.Menu
HKCR\jao.jao
HKCR\IEToolbar.AffiliateCtl
HKCR\DailyToolbar.SysMgr
HKCR\DailyToolbar.IEBand
HKCR\Bridge.brdg
HKCR\AlxTB.BHO

 
--- MultiMail/Win32 v0.43
 * Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)