Text 321, 1057 rader
Skriven 2007-08-06 14:18:00 av KURT WISMER (1:123/140)
Ärende: News, August 6 2007
===========================
[cut-n-paste from sophos.com]
Name Troj/ServU-EW
Type
* Trojan
Affected operating systems
* Windows
Prevalence (1-5) 2
Description
Troj/ServU-EW is a Trojan for the Windows platform.
Name W32/Romario-A
Type
* Worm
How it spreads
* Removable storage devices
* Email attachments
Affected operating systems
* Windows
Side effects
* Sends itself to email addresses found on the infected computer
* Forges the sender's email address
* Uses its own emailing engine
* Reduces system security
* Installs itself in the Registry
Prevalence (1-5) 2
Description
W32/Romario-A is a mass-mailing worm for the Windows platform.
Advanced
W32/Romario-A is a mass-mailing worm for the Windows platform.
W32/Romario-A spreads to other network computers.
When first run W32/Romario-A copies itself to the root folder and to:
<User>\Documents\Bola Pantul.exe
<User>\Documents\FreeCard.exe
<User>\Documents\MyHearts.exe
<User>\Application Data\Alisa.exe
<User>\Application Data\Emma.exe
<User>\My Documents\Mario Bross.exe
<User>\My Documents\Minesweeper.exe
<User>\My Documents\Solitaire Card.exe
<Root>\Mario.exe
<Root>\game\Bola.exe
<Root>\game\Crazy Mouse.exe
<Root>\game\Dark Screen.exe
<Root>\game\Goncang.exe
<Root>\game\Kartu.exe
<Root>\game\Kelap Kelip.exe
<Root>\game\Layar Jatuh.exe
<Root>\game\Legend.exe
<Root>\game\Minesweeper.exe
<Root>\game\My Heart.exe
<Root>\game\Pink Panther.exe
<Root>\game\Smart.exe
<Root>\game\Start Hide.exe
<Root>\game\Text Animation.exe
<Root>\game\XP Button.exe
<System>\PANGKALP1NANG.EXE
<System>\SMUNSA_PKP_GAME.EXE
<System>\msvbvm60.dll.exe
<Windows>\winlogon.exe
and creates the following files:
<User>\Application Data\Aliciana.htt - detected as W32/Romario-A
<User>\Application Data\Emira.ini - detected as W32/Romario-A
<Windows>\Tasks\At1.job - can be safely removed
The following registry entries are created to run W32/Romario-A on
startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Mr_CoolFace_Game
<User>\Application Data\Emma.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SmansaApp
<Windows>\winlogon.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
urudjeffni
<Windows>\winlogon.exe
The following registry entries are changed to run W32/Romario-A on
startup:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
<original worm filename> "<Root>\explorer.exe"
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
<System>\userinit.exe, <Root>\<original worm filename>
The following registry entries are set or modified, so that
W32/Romario-A is run when files with extensions of BAT, COM, PIF and
SCR are opened/launched:
HKCR\VBSFile\Shell\Open\Command
(default)
<Root>\<original worm filename>" "%1" %*
HKCR\batfile\shell\open\command
(default)
<Root>\<original worm filename>" "%1" %*
HKCR\comfile\shell\open\command
(default)
<Root>\<original worm filename>" "%1" %*
HKCR\movfile\Shell\Open\Command
(default)
<Root>\<original worm filename>" "%1" %*
HKCR\piffile\shell\open\command
(default)
<Root>\<original worm filename>" "%1" %*
HKCR\scrfile\shell\open\command
(default)
<Root>\<original worm filename>" "%1" %*
W32/Romario-A changes settings for Microsoft Internet Explorer by
modifying values under:
HKCU\Software\Microsoft\Internet Explorer\Main\Start Page
HKLM\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page
The following registry entries are set, disabling system software:
HKLM\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore
DisableConfig
1
HKLM\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore
DisableSR
1
The following registry entry is set:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\S
uperHidden
UncheckedValue
0
Registry entries are created under:
HKCU\Identities\(72F74F8A-A79D-406D-9B40-AB4C1057B8FD)\Software\Microsoft
\Outlook Express\5.0\Mail
W32/Romario-A also creates a scheduled job to run itself everyday at a
specified time.
W32/Romario-A also copies itself to removable drives by creating a
folder "GAME" on the removable drive and copying itself to that folder
as the following names:
Legend.exe
Kartu.exe
Bola.exe
My Heart.exe
Minesweeper.exe
Dark Screen.exe
Layar Jatuh.exe
Kelap Kelip.exe
Goncang.exe
XP Button.exe
Start Hide.exe
Pink Panther.exe
Text Animation.exe
Crazy Mouse.exe
Smart.exe
Administrator Game.exe
Name W32/QQRob-ADP
Type
* Worm
How it spreads
* Network shares
Affected operating systems
* Windows
Side effects
* Installs itself in the Registry
Aliases
* Generic Downloader.ak
* Trojan-Downloader.Win32.Small.ecw
Prevalence (1-5) 2
Description
W32/QQRob-ADP is a worm for the Windows platform.
Advanced
W32/QQRob-ADP is a worm for the Windows platform.
W32/QQRob-ADP spreads to other network computers.
W32/QQRob-ADP includes functionality to access the internet and
communicate with a remote server via HTTP.
When first run W32/QQRob-ADP copies itself to <System>\scvhsot.exe and
may copy itself to removable drives with the name sss.exe.
W32/QQRob-ADP will also create an autorun.inf file on the removable
drive which is detected as Mal/AutoInf-A.
The following registry entry is created to run scvhsot.exe on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
QQKAV
<System>\scvhsot.exe
Name Troj/Keygen-BL
Type
* Trojan
Affected operating systems
* Windows
Prevalence (1-5) 2
Description
Troj/Keygen-BL is a key generator for Roboform software.
Name W32/SillyFDC-AO
Type
* Worm
How it spreads
* Removable storage devices
Affected operating systems
* Windows
Side effects
* Installs itself in the Registry
Prevalence (1-5) 2
Description
W32/SillyFDC-AO is a worm for the Windows platform that spreads via
removable shared drives.
Advanced
W32/SillyFDC-AO is a worm for the Windows platform that spreads via
removable shared drives.
When run W32/SillyFDC-AO sets the following registry entries to run
itself on startup:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\usbmon
Asynchronous
1
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\usbmon
DLLName
<path to Worm DLL>
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\usbmon
Impersonate
0
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\usbmon
Shutdown
DoShutdown
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\usbmon
Startup
DoStartup
W32/SillyFDC-AO also attempts to spread via removable shared drives by
creating the file <Root>\Autorun.inf and creating the following file in
the hidden folder <Root>\RECYCLER\RECYCLER:
desktop.ini - can be safely removed
Name W32/Sdbot-DFO
Type
* Worm
How it spreads
* Network shares
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Installs itself in the Registry
Prevalence (1-5) 2
Description
W32/Sdbot-DFO is a worm for the Windows platform which allows
unauthorized remote access to the computer over a network.
Advanced
W32/Sdbot-DFO is a worm for the Windows platform which allows
unauthorized remote access to the computer over a network.
W32/Sdbot-DFO runs continuously in the background, providing a backdoor
server which allows a remote intruder to gain access and control over
the computer via IRC channels.
W32/Sdbot-DFO includes functionality to access the internet and
communicate with a remote server via HTTP.
When first run W32/Sdbot-DFO copies itself to <System>\alg32.exe.
The following registry entries are created to run alg32.exe on startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Office Monitor
<System>\alg32.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Office Monitor
<System>\alg32.exe
The following registry entry is set:
HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N
Name W32/Rbot-GSN
Type
* Worm
How it spreads
* Removable storage devices
* Network shares
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Modifies data on the computer
* Downloads code from the internet
* Installs itself in the Registry
* Exploits system or software vulnerabilities
Aliases
* W32/Sdbot.worm.gen.ax
Prevalence (1-5) 2
Description
W32/Rbot-GSN is a worm with IRC backdoor functionality for the Windows
platform.
W32/Rbot-GSN spreads to other network computers by exploiting common
buffer overflow vulnerabilities, including: SRVSVC (MS06-040), RPC-DCOM
(MS04-012) Symantec (SYM06-010) and ASN.1 (MS04-007). The worm may also
spreads via network shares and removable storage devices.
W32/Rbot-GSN runs continuously in the background, providing a backdoor
server which allows a remote intruder to gain access and control over
the computer via IRC channels.
W32/Rbot-GSN includes functionality to download, install and run new
software.
Advanced
W32/Rbot-GSN is a worm with IRC backdoor functionality for the Windows
platform.
W32/Rbot-GSN spreads to other network computers by exploiting common
buffer overflow vulnerabilities, including: SRVSVC (MS06-040), RPC-DCOM
(MS04-012) Symantec (SYM06-010) and ASN.1 (MS04-007). The worm may also
spreads via network shares and removable storage devices.
W32/Rbot-GSN runs continuously in the background, providing a backdoor
server which allows a remote intruder to gain access and control over
the computer via IRC channels.
W32/Rbot-GSN includes functionality to download, install and run new
software.
When first run W32/Rbot-GSN copies itself to:
<System>\<random>.exe
<Root>\<random>.exe
and creates the file <Root>\autorun.inf.
W32/Rbot-GSN may also copy itself to existing zip files.
The following registry entry is created to run rwomlysrm.exe on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ctfmon32
<System>\<random>.exe
The following registry entry is set, affecting internet security:
HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPo
licy\StandardProfile\AuthorizedApplications\List
<System>\<random>.exe
<System>\<random>.exe:*:Enabled:ctfmon32
Name Troj/Nogata-A
Type
* Spyware Trojan
Affected operating systems
* Windows
Side effects
* Steals information
* Uses its own emailing engine
* Downloads code from the internet
* Installs itself in the Registry
* Leaves non-infected files on computer
Prevalence (1-5) 2
Description
Troj/Nogata-A is a Trojan for the Windows platform.
Advanced
Troj/Nogata-A is a Trojan for the Windows platform.
Troj/Nogata-A includes functionality to send notification messages to
remote locations, including infomation about the infected computer to a
remote user via email.
When first run Troj/Nogata-A copies itself to <System>\NvCCCpl.exe and
may create the following clean files:
<Windows>\Update525822374.log
<Windows>\MSNList.txt
The following registry entry is created to run NvCCCpl.exe on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
NvCCCpl
<System>\NvCCCpl.exe
Name Mal/DSpy-A
Type
* Malicious Behavior
How it spreads
* Web browsing
Affected operating systems
* Windows
Side effects
* Steals information
* Records keystrokes
* Installs itself in the Registry
* Monitors browser activity
* Modifies browser settings
Prevalence (1-5) 2
Description
Mal/DSpy-A is a family of spyware Trojans for the Windows platform.
Advanced
Mal/DSpy-A is a family of spyware Trojans for the Windows platform.
When first run Mal/DSpy-A copies itself to <System>\lsass.exe.
The following registry entry is created to run lsass.exe on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
internet
<System>\lsass.exe
The following registry entry is set, affecting internet security:
HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
1601
0
Name PHP/C99Shell-A
Type
* Trojan
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
Aliases
* PHP/C99Shell.A
* Backdoor.PHP.C99Shell.c
Prevalence (1-5) 2
Description
PHP/C99Shell-A is a backdoor Trojan for platforms with PHP support,
such as web servers.
PHP/C99Shell-A listens for commands from a remote user.
Name W32/Sdbot-DGO
Type
* Spyware Worm
How it spreads
* Network shares
* Chat programs
Affected operating systems
* Windows
Side effects
* Turns off anti-virus applications
* Allows others to access the computer
* Steals information
* Reduces system security
* Installs itself in the Registry
* Exploits system or software vulnerabilities
Prevalence (1-5) 2
Description
W32/Sdbot-DGO is a worm for the Windows platform.
W32/Sdbot-DGO spreads
- to computers vulnerable to common exploits, including: LSASS
(MS04-011), SRVSVC (MS06-040), RPC-DCOM (MS04-012), PNP (MS05-039),
ASN.1 (MS04-007), RealVNC (CVE-2006-2369) and Symantec (SYM06-010)
- to network shares
- via AOL Instant Messenger
W32/Sdbot-DGO runs continuously in the background, providing a backdoor
server which allows a remote intruder to gain access and control over
the computer via IRC channels.
W32/Sdbot-DGO includes functionality to access the internet and
communicate with a remote server via HTTP.
Advanced
W32/Sdbot-DGO is a worm for the Windows platform.
W32/Sdbot-DGO spreads
- to computers vulnerable to common exploits, including: LSASS
(MS04-011), SRVSVC (MS06-040), RPC-DCOM (MS04-012), PNP (MS05-039),
ASN.1 (MS04-007), RealVNC (CVE-2006-2369) and Symantec (SYM06-010)
- to network shares
- via AOL Instant Messenger
W32/Sdbot-DGO runs continuously in the background, providing a backdoor
server which allows a remote intruder to gain access and control over
the computer via IRC channels.
W32/Sdbot-DGO includes functionality to access the internet and
communicate with a remote server via HTTP.
When first run W32/Sdbot-DGO copies itself to <System>\msnrav.exe.
The file msnrav.exe is registered as a new system driver service named
"MSN RAV", with a display name of "MSN RAV" and a startup type of
automatic. Registry entries are created under:
HKLM\SYSTEM\CurrentControlSet\Services\MSN RAV
W32/Sdbot-DGO sets the following registry entries, disabling the
automatic startup of other software:
HKLM\SYSTEM\CurrentControlSet\Services\Messenger
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\TlntSvr
Start
4
Registry entries are set as follows:
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
EnableFirewall
0
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile
EnableFirewall
0
HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotAllowXPSP2
1
HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N
Registry entries are created under:
HKLM\SOFTWARE\Microsoft\Security Center
Name Troj/Dloadr-AZC
Type
* Trojan
Affected operating systems
* Windows
Side effects
* Downloads code from the internet
Prevalence (1-5) 2
Description
Troj/Dloadr-AZC is a Trojan for the Windows platform.
The Trojan includes functionality to access the internet and
communicate with a remote server via HTTP.
Name Troj/Dloadr-BCP
Type
* Trojan
How it spreads
* Email attachments
* Web browsing
Affected operating systems
* Windows
Side effects
* Drops more malware
* Downloads code from the internet
Prevalence (1-5) 2
Description
Troj/Dloadr-BCP is a Trojan for the Windows platform.
Advanced
Troj/Dloadr-BCP is a Trojan for the Windows platform.
Troj/Dloadr-BCP has been spammed out in email messages masquerading as
free photos/videos of celebrities.
When Troj/Dloadr-BCP is run it creates the file
<System>\drivers\runtime.sys. This file is already detected as
Troj/NTRootK-BY. The file runtime.sys is registered as a new system
driver service named "runtime". Registry entries are created under:
HKLM\SYSTEM\CurrentControlSet\Services\runtime
Troj/Dloadr-BCP also drops the file <System>\drivers\secdrv.sys
(overwriting existing file if it exists). This file is already detected
as Troj/Agent-FVT.
Name W32/DelMP3-A
Type
* Worm
How it spreads
* Removable storage devices
* Network shares
Affected operating systems
* Windows
Side effects
* Installs itself in the Registry
Aliases
* W32/Deletemp3.worm
* Virus.Win32.AutoRun.ah
* Win32/AutoRun.AH
* WORM_DELF.HXZ
* W32.Deletemusic
Prevalence (1-5) 2
Description
W32/DelMP3-A is a network worm for the Windows platform.
Advanced
W32/DelMP3-A is a worm for the Windows platform.
W32/DelMP3-A spreads via removable drives and network shares.
The worm deletes files with the MP3 extension.
When W32/DelMP3-A is installed the following files are created:
\config\àutorun.inf
\logon.bat
The following registry entry is created to run logon.bat on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Worms
\logon.bat
The following registry entry is set, disabling system software:
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
DisableTaskMgr
1
The following registry entry is set:
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
NoFolderOptions
1
Name W32/Tilebot-KC
Type
* Worm
How it spreads
* Network shares
Affected operating systems
* Windows
Side effects
* Turns off anti-virus applications
* Allows others to access the computer
* Reduces system security
* Installs itself in the Registry
* Exploits system or software vulnerabilities
Aliases
* W32/Backdoor.BDUM
Prevalence (1-5) 2
Description
W32/Tilebot-KC is a worm and IRC backdoor for the Windows platform.
W32/Tilebot-KC spreads
- to computers vulnerable to common exploits, including: ASN.1
(MS04-007)
- to network shares
W32/Tilebot-KC runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
W32/Tilebot-KC includes functionality to access the internet and
communicate with a remote server via HTTP.
Advanced
W32/Tilebot-KC is a worm and IRC backdoor for the Windows platform.
W32/Tilebot-KC spreads
- to computers vulnerable to common exploits, including: ASN.1
(MS04-007)
- to network shares
W32/Tilebot-KC runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
W32/Tilebot-KC includes functionality to access the internet and
communicate with a remote server via HTTP.
When first run W32/Tilebot-KC copies itself to:
<Windows>\Avsynmgr.exe
The file Avsynmgr.exe is registered as a new system driver service
named "McAfee Internet security suite", with a display name of "McAfee
Internet security suite" and a startup type of automatic.
W32/Tilebot-KC modifies the following files, affecting the system file
checker and command line file transfers:
<System>\sfc_os.dll
<System>\ftp.exe
<System>\tftp.exe
These files should be restored from a clean system backup.
W32/Tilebot-KC may create the files:
<System>\backup.ftp
<System>\backup.tftp
which are the original copies of ftp.exe and tftp.exe.
Registry entries are created under:
HKLM\SYSTEM\CurrentControlSet\Services\McAfee Internet security suite
The following registry entries are set, disabling system software:
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
DisableTaskMgr
1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
DisableRegistryTools
1
W32/Tilebot-KC sets the following registry entries, disabling the
automatic startup of other software:
HKLM\SYSTEM\CurrentControlSet\Services\Messenger
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\TlntSvr
Start
4
Registry entries are set as follows:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
SFCScan
0
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
EnableFirewall
0
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile
EnableFirewall
0
HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotAllowXPSP2
1
HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
SFCDisable
ffffff9d
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
Explorer.exe %WINDIR%\Avsynmgr.exe
Registry entries are created under:
HKLM\SOFTWARE\Microsoft\Security Center
HKLM\SOFTWARE\Symantec\LiveUpdate Admin
Name W32/Rbot-GSP
Type
* Worm
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Exploits system or software vulnerabilities
Prevalence (1-5) 2
Description
W32/Rbot-GSP is a network worm for the Windows platform.
W32/Rbot-GSP spreads by exploiting common software vulnerabilities
including SRVSVC (MS06-040), WKS (MS03-049) (CAN-2003-0812), MSSQL
(MS02-039) (CAN-2002-0649), PNP (MS05-039), ASN.1 (MS04-007), Realcast,
RealVNC (CVE-2006-2369), Symantec (SYM06-010).
Advanced
W32/Rbot-GSP is a network worm for the Windows platform.
W32/Rbot-GSP spreads by exploiting common software vulnerabilities
including SRVSVC (MS06-040), WKS (MS03-049) (CAN-2003-0812), MSSQL
(MS02-039) (CAN-2002-0649), PNP (MS05-039), ASN.1 (MS04-007), Realcast,
RealVNC (CVE-2006-2369), Symantec (SYM06-010).
W32/Rbot-GSP allows a remote attacker to control the infected computer
through IRC channels.
When first run W32/Rbot-GSP copies itself to <System>\winupdate.exe and
creates the file <Root>\a.bat.
The file a.bat is detected as Troj/Batten-A.
Name Troj/LegMir-ARG
Type
* Spyware Trojan
Affected operating systems
* Windows
Side effects
* Turns off anti-virus applications
* Steals information
* Downloads code from the internet
* Installs itself in the Registry
Prevalence (1-5) 2
Description
Troj/LegMir-ARG is a Trojan for the Windows platform.
Advanced
Troj/LegMir-ARG is a Trojan for the Windows platform.
Once installed Troj/LegMir-ARG may set the following registry entries:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
AppInit_DLLs
Troj/LegMir-ARG includes functionality to terminate security and
anti-virus related processes.
Name W32/Potty-B
Type
* Virus
How it spreads
* Removable storage devices
* Infected files
Affected operating systems
* Windows
Side effects
* Installs itself in the Registry
Prevalence (1-5) 2
Description
W32/Potty-B is an overwriting virus for the Windows platform.
Advanced
W32/Potty-B is an overwriting virus for the Windows platform.
When run the virus overwrites any file that has an EXE extension with
itself, and replaces any others with their original name and EXE
extension.
W32/Potty-B copies itself to <System>\win32.exe. The following registry
entry is created to run win32.exe on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Load
<System>\win32.exe
The virus attempts to copy itself to the A: and B: drives, where
available.
--- MultiMail/Win32 v0.43
* Origin: Doc's Place BBS Fido Since 1991 docsplace.tzo.com (1:123/140)
|