Text 85, 2028 rader
Skriven 2005-11-06 09:57:00 av KURT WISMER (1:123/140)
Ärende: News, November 6 2005
=============================
[cut-n-paste from sophos.com]
Name   Troj/BagleDl-AB
Type  
    * Trojan
Affected operating systems  
    * Windows
Side effects  
    * Installs itself in the Registry
Prevalence (1-5) 3
Description
Troj/BagleDl-AB is a Trojan for the Windows platform.
When first run Troj/BagleDl-AB copies itself to 
<System>\hloader_exe.exe and creates the file 
<System>\hloader_dll.dll. Both these files are detected as 
Troj/BagleDl-AB.
Advanced
Troj/BagleDl-AB is a Trojan for the Windows platform.
When first run Troj/BagleDl-AB copies itself to 
<System>\hloader_exe.exe and creates the file 
<System>\hloader_dll.dll. Both these files are detected as 
Troj/BagleDl-AB.
Troj/BagleDl-AB attempts to inject the dropped file hloader_dll.dll 
into the process explorer.exe.
The following registry entries are created to run hloader_exe.exe on 
startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<System>\hloader_exe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<System>\hloader_exe.exe
Troj/BagleDl-AB attempts to download and execute files from a number 
of remote websites.
Name   Troj/BagleDl-Y
Type  
    * Trojan
Affected operating systems  
    * Windows
Side effects  
    * Drops more malware
    * Downloads code from the internet
    * Installs itself in the Registry
Aliases  
    * W32/Bagle.gen
Prevalence (1-5) 3
Description
Troj/BagleDl-Y downloads files from a number of remote websites and 
executes them.
Advanced
Troj/BagleDl-Y is a downloading Trojan for the Windows platform.
When first run Troj/BagleDl-Y copies itself to 
<System>\hloader_exe.exe and creates the file 
<System>\hleader_dll.dll. Both these files are detected as 
Troj/BagleDl-Y.
The following registry entries are created to run hloader_exe.exe on 
startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<System>\hloader_exe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<System>\hloader_exe.exe
Troj/BagleDl-Y attempts to download and execute files from a number 
of remote websites.
Name   Troj/BagleDl-AA
Type  
    * Trojan
Affected operating systems  
    * Windows
Side effects  
    * Turns off anti-virus applications
    * Deletes files off the computer
    * Reduces system security
    * Installs itself in the Registry
    * Dropped by malware
Aliases  
    * Email-Worm.Win32.Bagle.eh
    * W32/Bagle.gen
Prevalence (1-5) 3
Description
Troj/BagleDl-AA is a Trojan for the Windows platform.
Troj/BagleDl-AA attempts to terminate processes and services, delete 
files and registry entries, and block access to URLs related to 
anti-virus and security programs.
Advanced
Troj/BagleDl-AA is a Trojan for the Windows platform.
When first run Troj/BagleDl-AA copies itself to 
<System>\antiav_exe.exe and creates the file <System>\antiav_dll.dll. 
Both these files are detected as Troj/BagleDl-AA.
Troj/BagleDl-AA attempts to inject the dropped file antiav_dll.dll 
into the process explorer.exe.
The following registry entries are created to run antiav_exe.exe on 
startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
auto__antiav__key
<System>\antiav_exe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
auto__antiav__key
<System>\antiav_exe.exe
Troj/BagleDl-AA attempts to terminate several processes and services 
related to anti-virus and security programs, to delete related files, 
to modify C:\boot.ini to delete related files on system startup, to 
block access to related websites, to delete related registry entries, 
and to delete registry entries at the folling location to stop 
related files from running on system startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\
Run
HKCU\Software\Microsoft\Windows\CurrentVersion\
Run
Name   Troj/BagleDl-Z
Type  
    * Trojan
Affected operating systems  
    * Windows
Side effects  
    * Drops more malware
    * Downloads code from the internet
    * Installs itself in the Registry
Aliases  
    * W32/Bagle.gen
Prevalence (1-5) 3
Description
Troj/BagleDl-Z downloads files from a number of remote websites and 
executes them.
Advanced
Troj/BagleDl-Z is a downloading Trojan for the Windows platform.
When first run Troj/BagleDl-Z copies itself to 
<System>\hloader_exe.exe and creates the file 
<System>\hleader_dll.dll. Both these files are detected as 
Troj/BagleDl-Z.
The following registry entries are created to run hloader_exe.exe on 
startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<System>\hloader_exe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<System>\hloader_exe.exe
Troj/BagleDl-Z attempts to download and execute files from a number 
of remote websites.
Name   W32/Mytob-FH
Type  
    * Worm
How it spreads  
    * Email attachments
Affected operating systems  
    * Windows
Side effects  
    * Allows others to access the computer
    * Modifies data on the computer
    * Forges the sender's email address
    * Uses its own emailing engine
    * Reduces system security
Prevalence (1-5) 3
Description
W32/Mytob-FH is a mass-mailing worm and IRC backdoor Trojan for the 
Windows platform.
W32/Mytob-FH runs continuously in the background, providing a 
backdoor server which allows a remote intruder to gain access and 
control over the computer via IRC channels.
Emails sent by the worm have characteristics from the following:
Subject line:
Your password has been updated
Your password has been successfully updated
You have successfully updated your password
Your new account password is approved
Your Account is Suspended
*DETECTED* Online User Violation
Your Account is Suspended For Security Reasons
Warning Message: Your services near to be closed.
Important Notification
Members Support
Security measures
Email Account Suspension
Notice of account limitation
<random characters>
Message text - a formatted version of one of the following:
Dear user <recipient's username>,
You have successfully updated the password of your 
<recipient's domain> account.
If you did not authorize this change or if you need assistance with 
your account, please contact <recipient's domain> customer service at: <spoofed
sender address>
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team <BR>
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear user <recipient's username>,
It has come to our attention that your <recipient's domain> User 
Profile ( x ) records are out of date. For further details see the 
attached document.
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's username> Member,
We have temporarily suspended your email account <recipient's domain>.
This might be due to either of the following reasons:
1. A recent change in your personal information (i.e. change of 
address).
2. Submiting invalid information during the initial sign up process.
3. An innability to accurately verify your selected option of 
subscription due to an internal error within our processors.
See the details to reactivate your <recipient's domain> account.
Sincerely,The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's domain> Member,
Your e-mail account was used to send a huge amount of unsolicited 
spam messages during the recent week. If you could please take 5-10 
minutes out of your online experience and confirm the attached 
document so you will not run into any future problems with the online 
service.
If you choose to ignore our request, you leave us no choice but to 
cancel your membership.
Virtually yours,
The <recipient's domain> Support Team
+++ Attachment: No Virus found
+++ <recipient's domain> Antivirus - www.<recipent's domain>
Attachment name:
updated-password
email-password
new-password
password
approved-password
account-password
accepted-password
important-details
account-details
email-details
account-info
document
readme
account-report
First extension (of attachment or of file inside zip):
doc
htm
txt
Second extension (of attachment or of file inside zip):
pif
scr
exe
cmd
bat
If the attachment is a zip file it will have the same base name as 
the double-extension file inside.
Advanced
W32/Mytob-FH is a mass-mailing worm and IRC backdoor Trojan for the 
Windows platform.
W32/Mytob-FH runs continuously in the background, providing a 
backdoor server which allows a remote intruder to gain access and 
control over the computer via IRC channels.
Emails sent by the worm have characteristics from the following:
Subject line:
Your password has been updated
Your password has been successfully updated
You have successfully updated your password
Your new account password is approved
Your Account is Suspended
*DETECTED* Online User Violation
Your Account is Suspended For Security Reasons
Warning Message: Your services near to be closed.
Important Notification
Members Support
Security measures
Email Account Suspension
Notice of account limitation
<random characters>
Message text - a formatted version of one of the following:
Dear user <recipient's username>,
You have successfully updated the password of your 
<recipient's domain> account.
If you did not authorize this change or if you need assistance with 
your account, please contact <recipient's domain> customer service at: 
<spoofed sender address>
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team <BR>
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear user <recipient's username>,
It has come to our attention that your <recipient's domain> User 
Profile ( x ) records are out of date. For further details see the 
attached document.
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's username> Member,
We have temporarily suspended your email account <recipient's domain>.
This might be due to either of the following reasons:
1. A recent change in your personal information (i.e. change of 
address).
2. Submiting invalid information during the initial sign up process.
3. An innability to accurately verify your selected option of 
subscription due to an internal error within our processors.
See the details to reactivate your <recipient's domain> account.
Sincerely,The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's domain> Member,
Your e-mail account was used to send a huge amount of unsolicited 
spam messages during the recent week. If you could please take 5-10 
minutes out of your online experience and confirm the attached 
document so you will not run into any future problems with the online 
service.
If you choose to ignore our request, you leave us no choice but to 
cancel your membership.
Virtually yours,
The <recipient's domain> Support Team
+++ Attachment: No Virus found
+++ <recipient's domain> Antivirus - www.<recipent's domain>
Attachment name:
updated-password
email-password
new-password
password
approved-password
account-password
accepted-password
important-details
account-details
email-details
account-info
document
readme
account-report
First extension (of attachment or of file inside zip):
doc
htm
txt
Second extension (of attachment or of file inside zip):
pif
scr
exe
cmd
bat
If the attachment is a zip file it will have the same base name as 
the double-extension file inside.
Example attachment names include document.txt.pif and 
information.doc.cmd, usually with a large number of spaces between 
the extensions.
The following registry entries are created:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
NAMEDPIPE SYSTEM
\namedpipe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
NAMEDPIPE SYSTEM
\namedpipe.exe
W32/Mytob-FH sets the following registry entries, disabling the 
automatic startup of other software:
HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess
Start
4
Note: disabling autostart for the SharedAccess service deactivates 
the Microsoft Internet Connection Firewall (ICF).
W32/Mytob-FH modifies the HOSTS file, changing the URL-to-IP mappings 
for selected websites, therefore preventing normal access to these 
sites. The new HOSTS file will typically contain the following:
127.0.0.1 www.symantec.com
127.0.0.1 securityresponse.symantec.com
127.0.0.1 symantec.com
127.0.0.1 www.sophos.com
127.0.0.1 sophos.com
127.0.0.1 www.mcafee.com
127.0.0.1 mcafee.com
127.0.0.1 liveupdate.symantecliveupdate.com
127.0.0.1 www.viruslist.com
127.0.0.1 viruslist.com
127.0.0.1 viruslist.com
127.0.0.1 f-secure.com
127.0.0.1 www.f-secure.com
127.0.0.1 kaspersky.com
127.0.0.1 kaspersky-labs.com
127.0.0.1 www.avp.com
127.0.0.1 www.kaspersky.com
127.0.0.1 avp.com
127.0.0.1 www.networkassociates.com
127.0.0.1 networkassociates.com
127.0.0.1 www.ca.com
127.0.0.1 ca.com
127.0.0.1 mast.mcafee.com
127.0.0.1 my-etrust.com
127.0.0.1 www.my-etrust.com
127.0.0.1 download.mcafee.com
127.0.0.1 dispatch.mcafee.com
127.0.0.1 secure.nai.com
127.0.0.1 nai.com
127.0.0.1 www.nai.com
127.0.0.1 update.symantec.com
127.0.0.1 updates.symantec.com
127.0.0.1 us.mcafee.com
127.0.0.1 liveupdate.symantec.com
127.0.0.1 customer.symantec.com
127.0.0.1 rads.mcafee.com
127.0.0.1 trendmicro.com
127.0.0.1 pandasoftware.com
127.0.0.1 www.pandasoftware.com
127.0.0.1 www.trendmicro.com
127.0.0.1 www.grisoft.com
127.0.0.1 www.microsoft.com
127.0.0.1 microsoft.com
127.0.0.1 www.virustotal.com
127.0.0.1 virustotal.com
127.0.0.1 www.amazon.com
127.0.0.1 www.amazon.co.uk
127.0.0.1 www.amazon.ca
127.0.0.1 www.amazon.fr
127.0.0.1 www.paypal.com
127.0.0.1 paypal.com
127.0.0.1 moneybookers.com
127.0.0.1 www.moneybookers.com
127.0.0.1 www.ebay.com
127.0.0.1 ebay.com
Name   Troj/BagleDl-W
Type  
    * Trojan
Affected operating systems  
    * Windows
Side effects  
    * Downloads code from the internet
    * Installs itself in the Registry
Prevalence (1-5) 3
Description
Troj/BagleDl-W is a Trojan for the Windows platform.
Advanced
Troj/BagleDl-W is a Trojan for the Windows platform.
When first run Troj/BagleDl-W copies itself to 
<Windows system folder>\hloader_exe.exe and creates the file 
<Windows system folder>\hloader_dll.dll. Both these files are 
detected as Troj/BagleDl-W.
Troj/BagleDl-W attempts to inject the dropped file hloader_dll.dll 
into the process explorer.exe.
The following registry entries are created to run hloader_exe.exe on 
startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<Windows system folder>\hloader_exe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<Windows system folder>\hloader_exe.exe
Troj/BagleDl-W attempts to download and execute files from a number 
of remote websites.
Name   W32/Mytob-FF
Type  
    * Worm
How it spreads  
    * Email attachments
Affected operating systems  
    * Windows
Side effects  
    * Turns off anti-virus applications
    * Sends itself to email addresses found on the infected computer
    * Forges the sender's email address
    * Uses its own emailing engine
    * Downloads code from the internet
Prevalence (1-5) 3
Description
W32/Mytob-FF is a mass-mailing worm and IRC backdoor Trojan.
W32/Mytob-FF runs continuously in the background, providing a backdoor server
which allows a remote intruder to gain access and control over the computer via
IRC channels, including the ability to download and execute files on the
infected computer.
W32/Mytob-FF can spread by sending itself as an email attachment to 
email addresses it harvests from the infected computer, either as an 
attachment with a double-extension or as a zip file containing a file 
with a double-extension. W32/Mytob-FF avoids sending emails to 
addresses containing certain strings in them.
W32/Mytob-FF processes the emails it has harvested by splitting them 
into name and domain. Once it has sent itself to the emails it has 
harvested, it uses a predefined list of names with the harvested 
domains. W32/Mytob-FF spoofs the sender, sending emails as if from 
one of the following at the same domain as the recipient:
support
administrator
mail
service
admin
info
register
webmaster
For example if sending itself to name@example.com, W32/Mytob-FF might 
send the email as if from admin@example.com.
Emails sent by the worm have characteristics from the following:
Subject line:
Your password has been updated
Your password has been successfully updated
You have successfully updated your password
Your new account password is approved
Your Account is Suspended
*DETECTED* Online User Violation
Your Account is Suspended For Security Reasons
Warning Message: Your services near to be closed.
Important Notification
Members Support
Security measures
Email Account Suspension
Notice of account limitation
<random characters>
Message text - a formatted version of one of the following:
Dear user <recipient's username>,
You have successfully updated the password of your <recipient's domain> 
account.
If you did not authorize this change or if you need assistance with 
your account, please contact <recipient's domain> customer service at: 
<spoofed sender address>
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team <BR>
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear user <recipient's username>,
It has come to our attention that your <recipient's domain> User 
Profile ( x ) records are out of date. For further details see the 
attached document.
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's username> Member,
We have temporarily suspended your email account <recipient's domain>.
This might be due to either of the following reasons:
1. A recent change in your personal information (i.e. change of 
address).
2. Submiting invalid information during the initial sign up process.
3. An innability to accurately verify your selected option of 
subscription due to an internal error within our processors.
See the details to reactivate your <recipient's domain> account.
Sincerely,The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's domain> Member,
Your e-mail account was used to send a huge amount of unsolicited 
spam messages during the recent week. If you could please take 5-10 
minutes out of your online experience and confirm the attached 
document so you will not run into any future problems with the online 
service.
If you choose to ignore our request, you leave us no choice but to 
cancel your membership.
Virtually yours,
The <recipient's domain> Support Team
+++ Attachment: No Virus found
+++ <recipient's domain> Antivirus - www.<recipent's domain>
Attachment name:
updated-password
email-password
new-password
password
approved-password
account-password
accepted-password
important-details
account-details
email-details
account-info
document
readme
account-report
<randomly named>
First extension (of attachment or of file inside zip):
doc
htm
txt
Second extension (of attachment or of file inside zip):
pif
scr
exe
cmd
bat
If the attachment is a zip file it will have the same base name as 
the double-extension file inside.
Example attachment names include document.txt.pif and 
information.doc.cmd, usually with a large number of spaces between 
the extensions.
W32/Mytob-FF modifies the Windows hosts file in order to block access 
to certain security-related websites.
Advanced
W32/Mytob-FF is a mass-mailing worm and IRC backdoor Trojan.
W32/Mytob-FF runs continuously in the background, providing a 
backdoor server which allows a remote intruder to gain access and 
control over the computer via IRC channels, including the ability to 
download and execute files on the infected computer.
When first run W32/Mytob-FF attempts to copy itself to 
<System>\pipe.exe.
The following registry entries are created to run pipe.exe on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
PIPE SYSTEM
pipe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
PIPE SYSTEM
pipe.exe
W32/Mytob-FF sets the following registry entries, disabling the 
automatic startup of other software:
HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess
Start
4
Note: disabling autostart for the SharedAccess service deactivates 
the Microsoft Internet Connection Firewall (ICF).
W32/Mytob-FF can spread by sending itself as an email attachment to 
email addresses it harvests from the infected computer, either as an 
attachment with a double-extension or as a zip file containing a file 
with a double-extension. W32/Mytob-FF avoids sending emails to 
addresses containing certain strings in them.
W32/Mytob-FF processes the emails it has harvested by splitting them 
into name and domain. Once it has sent itself to the emails it has 
harvested, it uses a predefined list of names with the harvested 
domains. W32/Mytob-FF spoofs the sender, sending emails as if from 
one of the following at the same domain as the recipient:
support
administrator
mail
service
admin
info
register
webmaster
For example if sending itself to name@example.com, W32/Mytob-FF might 
send the email as if from admin@example.com.
Emails sent by the worm have characteristics from the following:
Subject line:
Your password has been updated
Your password has been successfully updated
You have successfully updated your password
Your new account password is approved
Your Account is Suspended
*DETECTED* Online User Violation
Your Account is Suspended For Security Reasons
Warning Message: Your services near to be closed.
Important Notification
Members Support
Security measures
Email Account Suspension
Notice of account limitation
<random characters>
Message text - a formatted version of one of the following:
Dear user <recipient's username>,
You have successfully updated the password of your <recipient's domain> 
account.
If you did not authorize this change or if you need assistance with 
your account, please contact <recipient's domain> customer service at: 
<spoofed sender address>
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team <BR>
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear user <recipient's username>,
It has come to our attention that your <recipient's domain> User 
Profile ( x ) records are out of date. For further details see the 
attached document.
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's username> Member,
We have temporarily suspended your email account <recipient's domain>.
This might be due to either of the following reasons:
1. A recent change in your personal information (i.e. change of 
address).
2. Submiting invalid information during the initial sign up process.
3. An innability to accurately verify your selected option of 
subscription due to an internal error within our processors.
See the details to reactivate your <recipient's domain> account.
Sincerely,The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's domain> Member,
Your e-mail account was used to send a huge amount of unsolicited 
spam messages during the recent week. If you could please take 5-10 
minutes out of your online experience and confirm the attached 
document so you will not run into any future problems with the online 
service.
If you choose to ignore our request, you leave us no choice but to 
cancel your membership.
Virtually yours,
The <recipient's domain> Support Team
+++ Attachment: No Virus found
+++ <recipient's domain> Antivirus - www.<recipent's domain>
Attachment name:
updated-password
email-password
new-password
password
approved-password
account-password
accepted-password
important-details
account-details
email-details
account-info
document
readme
account-report
<randomly named>
First extension (of attachment or of file inside zip):
doc
htm
txt
Second extension (of attachment or of file inside zip):
pif
scr
exe
cmd
bat
If the attachment is a zip file it will have the same base name as 
the double-extension file inside.
Example attachment names include document.txt.pif and 
information.doc.cmd, usually with a large number of spaces between 
the extensions.
W32/Mytob-FF attempts to terminate a large number of processes 
related to security and anti-virus programs including REGEDIT.EXE, 
MSCONFIG.EXE and NETSTAT.EXE.
W32/Mytob-FF modifies the Windows hosts file in order to block access 
to the following security-related websites:
127.0.0.1 www.symantec.com
127.0.0.1 securityresponse.symantec.com
127.0.0.1 symantec.com
127.0.0.1 www.sophos.com
127.0.0.1 sophos.com
127.0.0.1 www.mcafee.com
127.0.0.1 mcafee.com
127.0.0.1 liveupdate.symantecliveupdate.com
127.0.0.1 www.viruslist.com
127.0.0.1 viruslist.com
127.0.0.1 viruslist.com
127.0.0.1 f-secure.com
127.0.0.1 www.f-secure.com
127.0.0.1 kaspersky.com
127.0.0.1 kaspersky-labs.com
127.0.0.1 www.avp.com
127.0.0.1 www.kaspersky.com
127.0.0.1 avp.com
127.0.0.1 www.networkassociates.com
127.0.0.1 networkassociates.com
127.0.0.1 www.ca.com
127.0.0.1 ca.com
127.0.0.1 mast.mcafee.com
127.0.0.1 my-etrust.com
127.0.0.1 www.my-etrust.com
127.0.0.1 download.mcafee.com
127.0.0.1 dispatch.mcafee.com
127.0.0.1 secure.nai.com
127.0.0.1 nai.com
127.0.0.1 www.nai.com
127.0.0.1 update.symantec.com
127.0.0.1 updates.symantec.com
127.0.0.1 us.mcafee.com
127.0.0.1 liveupdate.symantec.com
127.0.0.1 customer.symantec.com
127.0.0.1 rads.mcafee.com
127.0.0.1 trendmicro.com
127.0.0.1 pandasoftware.com
127.0.0.1 www.pandasoftware.com
127.0.0.1 www.trendmicro.com
127.0.0.1 www.grisoft.com
127.0.0.1 www.microsoft.com
127.0.0.1 microsoft.com
127.0.0.1 www.virustotal.com
127.0.0.1 virustotal.com
127.0.0.1 www.amazon.com
127.0.0.1 www.amazon.co.uk
127.0.0.1 www.amazon.ca
127.0.0.1 www.amazon.fr
127.0.0.1 www.paypal.com
127.0.0.1 paypal.com
127.0.0.1 moneybookers.com
127.0.0.1 www.moneybookers.com
127.0.0.1 www.ebay.com
127.0.0.1 ebay.com
Name   Troj/Dagonit-A
Type  
    * Trojan
Affected operating systems  
    * Windows
Side effects  
    * Allows others to access the computer
    * Drops more malware
    * Installs itself in the Registry
Aliases  
    * Trojan.Win32.Agent.jh
Prevalence (1-5) 2
Description
Troj/Dagonit-A is a multicomponent backdoor Trojan for the Windows 
platform that allows unauthorized remote access through the randomly 
open TCP port.
The Trojan creates a user account with the name Service thas is used 
by the intruder to take over a control of the infected computer.
Advanced
Troj/Dagonit-A is a multicomponent backdoor Trojan for the Windows 
platform that allows unauthorized remote access through the randomly 
open TCP port.
The Trojan creates a user account with the name Service thas is used 
by the intruder to take over a control of the infected computer.
When Troj/Dagonit-A is installed the following files are created:
<current folder>\dali.reg
<current folder>\dalia2.exe
<current folder>\system.bat
<current folder>\winspool.exe
<current folder>\wpap.exe
where wpap.exe is detected as Troj/Wpap-A.
Troj/Dagonit-A may attempt to replace an original winspool.exe with 
the Trojan file.
Troj/Dagonit-A sets a number of registry entries including the 
following:
HKLM\System\CurrentControlSet\Services\RDSessMgr
Start
2
HKLM\System\CurrentControlSet\Services\TermService
Start
2
HKLM\System\CurrentControlSet\Services\TlntSvr
Start
2
HKLM\System\CurrentControlSet\Services\lanmanserver
Start
2
Thus making sure that the following services are started at the 
restart:
Remote Desktop Help Session Manager
Terminal Services
Telnet
Server
Also the Trojan sets the following registry entries in attempt to 
modify security settings:
HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server
fDenyTSConnections
0
TSAdvertise
1
IdleWinStationPoolCount
1
TSAppCompat
1
TSEnabled
1
TSUserEnabled
1
HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\Licensing Core
EnableConcurrentSessions
0
HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\Licensing Core
\WinStations\RDP-Tcp
fEnableWinStation
1
MaxInstanceCount
-1
Troj/Dagonit-A may attempt to delete the following files:
<System>\dllcashe\winlogon.exe
<System>\dllcashe\termsrv.dll
<System>\dllcashe\mstscax.dll
Name   W32/Rbot-AUQ
Type  
    * Worm
How it spreads  
    * Network shares
Affected operating systems  
    * Windows
Side effects  
    * Allows others to access the computer
    * Installs itself in the Registry
    * Exploits system or software vulnerabilities
Aliases  
    * Backdoor.Win32.Rbot.ahj
    * WORM_SDBOT.CFL
Prevalence (1-5) 2
Description
W32/Rbot-AUQ is a worm and IRC backdoor for the Windows platform.
W32/Rbot-AUQ runs continuously in the background, providing a 
backdoor server which allows a remote intruder to gain access and 
control over the computer via IRC channels.
W32/Rbot-AUQ may spread to network shares protected by weak passwords 
or by exploiting the following system vulnerabilities: LSASS 
(MS04-011), RPC-DCOM (MS04-012), WKS (MS03-049), PNP (MS05-039), ASN.1 
(MS04-007).
Advanced
W32/Rbot-AUQ is a worm and IRC backdoor for the Windows platform.
W32/Rbot-AUQ runs continuously in the background, providing a 
backdoor server which allows a remote intruder to gain access and 
control over the computer via IRC channels.
W32/Rbot-AUQ may spread to network shares protected by weak passwords 
or by exploiting the following system vulnerabilities: LSASS 
(MS04-011), RPC-DCOM (MS04-012), WKS (MS03-049), PNP (MS05-039), ASN.1 
(MS04-007).
When first run W32/Rbot-AUQ copies itself to 
<Windows system folder>\winsv.exe.
The following registry entries are created to run winsv.exe on startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Windows Spools SV
winsv.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Spools SV
winsv.exe
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
Windows Spools SV
winsv.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Windows Spools SV
winsv.exe
Registry entries are set as follows:
HKCU\SYSTEM\CurrentControlSet\Control\Lsa
Windows Spools SV
winsv.exe
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
Windows Spools SV
winsv.exe
HKCU\Software\Microsoft\OLE
Windows Spools SV
winsv.exe
HKLM\SOFTWARE\Microsoft\Ole
Windows Spools SV
winsv.exe
Name   W32/Poebot-P
Type  
    * Worm
How it spreads  
    * Network shares
Affected operating systems  
    * Windows
Side effects  
    * Allows others to access the computer
    * Installs itself in the Registry
    * Exploits system or software vulnerabilities
Aliases  
    * Backdoor.Win32.SdBot.aho
    * W32.Linkbot.M
    * WORM_RBOT.CFU
Prevalence (1-5) 2
Description
W32/Poebot-P is a worm for the Windows platform.
Advanced
W32/Poebot-P is a worm for the Windows platform.
When first run W32/Poebot-P copies itself to <System>\iexplore.exe 
and creates the file jotji.bat in the current folder. The file 
jotji.bat harmless on its own and can be safely removed.
W32/Poebot-P will attempt to connect to a remote URL and may spread 
through network shares protected by weak passwords and other exploits 
including:
LSASS (MS04-011)
RPC-DCOM (MS04-012)
WKS (MS03-049) (CAN-2003-0812)
WebDav (MS03-007)
Veritas (CAN-2004-1172)
Dameware (CAN-2003-1030)
PNP (MS05-039)
ASN.1 (MS04-007)
The following registry entry is created to run iexplore.exe on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Microsoft Internet Explorer
<System>\iexplore.exe
Name   Troj/ParDrop-A
Type  
    * Trojan
Affected operating systems  
    * Windows
Side effects  
    * Drops more malware
Aliases  
    * Trojan.Win32.Small.da
    * Trojan.Win32.Small.cz
    * TROJ_SMALL.RX
Prevalence (1-5) 2
Description
Troj/ParDrop-A is a dropper Trojan for the Windows platform.
When first run, Troj/ParDrop-A creates the following files (these 
files have their read-only, hidden file attributes set):
<System>\explore.exe - detected as Troj/ParDrop-A
<Temp>\<random filename>.tmp - detected as Troj/ParDrop-A
<System>\inetinfo.exe - detected as W32/Parite-B
<System>\svids.dll - data file which may be safely deleted
Troj/ParDrop-A then attempts to load the W32/Parite-B virus by 
running the file <System>\inetinfo.exe.
Advanced
Troj/ParDrop-A is a dropper Trojan for the Windows platform.
When first run, Troj/ParDrop-A creates the following files (these 
files have their read-only, hidden file attributes set):
<System>\explore.exe - detected as Troj/ParDrop-A
<Temp>\<random filename>.tmp - detected as Troj/ParDrop-A
<System>\inetinfo.exe - detected as W32/Parite-B
<System>\svids.dll - data file which may be safely deleted
Troj/ParDrop-A then attempts to load the W32/Parite-B virus by 
running the file <System>\inetinfo.exe.
Troj/ParDrop-A also sets the following registry entry to run the 
W32/Parite-B virus:
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
System
<System>\inetinfo.exe
Name   Troj/Goldun-AK
Type  
    * Spyware Trojan
Affected operating systems  
    * Windows
Side effects  
    * Allows others to access the computer
    * Steals information
    * Drops more malware
    * Reduces system security
    * Records keystrokes
    * Installs itself in the Registry
Prevalence (1-5) 2
Description
Troj/Goldun-AK is a Trojan for the Windows platform.
The Trojan steals login credentials entered into web forms related to 
certain financial institutions.
Advanced
Troj/Goldun-AK is a Trojan for the Windows platform.
When run, Troj/Goldun-AK creates the file mside.dll. The file 
mside.dll is registered as a COM object and Browser Helper Object 
(BHO) for Microsoft Internet Explorer, creating registry entries under:
HKCR\CLSID\{13146842-6251-5625-3072-548536364311}
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper
Objects\{13146842-6251-5625-3072-548536364311}
The Trojan steals login credentials entered into web forms related to 
certain financial institutions.
Name   W32/Rbot-AWB
Type  
    * Spyware Worm
How it spreads  
    * Network shares
    * Chat programs
Affected operating systems  
    * Windows
Side effects  
    * Allows others to access the computer
    * Modifies data on the computer
    * Deletes files off the computer
    * Steals information
    * Downloads code from the internet
Prevalence (1-5) 2
Description
W32/Rbot-AWB is a network worm with backdoor Trojan functionality for 
the Windows platform.
W32/Rbot-AWB can be controlled by a remote attacker over IRC channels. 
The backdoor component of W32/Rbot-AWB can be instructed by a 
remote user to perform various functions.
W32/Rbot-AWB spreads using a variety of techniques including:
-exploiting weak passwords on computers and SQL servers
-exploiting operating system vulnerabilities (including PnP [MS05-039]) 
and using backdoors opened by other worms or Trojans.
-by sending download links through the AOL Instant Messenger (AIM) 
client to online "buddies"
Advanced
W32/Rbot-AWB is a network worm with backdoor Trojan functionality for 
the Windows platform.
The worm copies itself to a file named msniu.exe in the Windows 
system folder and creates the following registry entries:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
MSN Messenger 32
"msniu.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MSN Messenger 32
"msniu.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
MSN Messenger 32
"msniu.exe"
W32/Rbot-AWB can be controlled by a remote attacker over IRC channels. 
The backdoor component of W32/Rbot-AWB can be instructed by a remote 
user to perform the following functions:
start an FTP server
start a Proxy server
start a web server
take part in distributed denial of service (DDoS) attacks
log keypresses
capture screen/webcam images
packet sniffing
port scanning
download/execute arbitrary files
start a remote shell (RLOGIN)
steal product registration information from certain software
W32/Rbot-AWB spreads using a variety of techniques including:
-exploiting weak passwords on computers and SQL servers
-exploiting operating system vulnerabilities (including PnP [MS05-039]) 
and using backdoors opened by other worms or Trojans.
-by sending download links through the AOL Instant Messenger (AIM) 
client to online "buddies"
Name   W32/Oscabot-N
Type  
    * Worm
How it spreads  
    * Chat programs
Affected operating systems  
    * Windows
Prevalence (1-5)
Description
W32/Oscabot-N is an instant messaging worm that can exploit users of 
AOL Instant Messaging clients.
W32/Oscabot-N will attempt to locate the Aim application and use it 
to send web links to other users.
Name   W32/Tilebot-AP
Type  
    * Spyware Worm
How it spreads  
    * Network shares
Affected operating systems  
    * Windows
Side effects  
    * Turns off anti-virus applications
    * Allows others to access the computer
    * Modifies data on the computer
    * Deletes files off the computer
    * Steals information
Prevalence (1-5) 2
Description
W32/Tilebot-AP is a worm which attempts to spread to remote network 
shares. It also contains backdoor Trojan functionality, allowing 
unauthorized remote access to the infected computer via IRC channels.
W32/Tilebot-AP spreads to network shares with weak passwords as a 
result of the backdoor Trojan element receiving the appropriate 
command from a remote user. The worm can spread to unpatched 
computers vulnerable to the following exploits:
ASN.1 (MS04-007)
LSASS (MS04-011)
PNP (MS05-039)
RPC-DCOM (MS04-012)
W32/Tilebot-AP attempts to remove network shares from the infected 
computer, as well as changing the policy for SeNetworkLogonRight for 
the computer.
W32/Tilebot-AP may attempt to contact scripts on remote sites.
Advanced
W32/Tilebot-AP is a worm which attempts to spread to remote network 
shares. It also contains backdoor Trojan functionality, allowing 
unauthorized remote access to the infected computer via IRC channels.
W32/Tilebot-AP spreads to network shares with weak passwords as a 
result of the backdoor Trojan element receiving the appropriate 
command from a remote user. The worm can spread to unpatched 
computers vulnerable to the following exploits:
ASN.1 (MS04-007)
LSASS (MS04-011)
PNP (MS05-039)
RPC-DCOM (MS04-012)
W32/Tilebot-AP copies itself to the Windows folder with the filename 
ipconfig32.exe and creates a service named "IPtable" with a start up 
type of automatic, causing the service to be run each time Windows 
starts.
W32/Tilebot-AP allows a remote user to perform a wide range of 
actions on the infected computer including downloading further files, 
setting registry entries and stealing information from the computer 
including from protected storage areas.
W32/Tilebot-AP attempts to terminate services with the following 
names in order to disrupt various security processes including the 
Windows firewall and Windows critical updates:
Tlntsvr
RemoteRegistry
Messenger
SharedAccess
wscsvc
W32/Tilebot-AP attempts to set the following registry entries to 
disrupt various security processes:
HKLM\SOFTWARE\Microsoft\Security Center
UpdatesDisableNotify
1
HKLM\SOFTWARE\Microsoft\Security Center
AntiVirusDisableNotify
1
HKLM\SOFTWARE\Microsoft\Security Center
FirewallDisableNotify
1
HKLM\SOFTWARE\Microsoft\Security Center
AntiVirusOverride
1
HKLM\SOFTWARE\Microsoft\Security Center
FirewallOverride
1
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
EnableFirewall
0
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile
EnableFirewall
0
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\
AutoUpdate
AUOptions
1
HKLM\SYSTEM\CurrentControlSet\Services\wscsvc
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\TlntSvr
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\Messenger
Start
4
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restictanonymous
1
HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters
AutoShareWks
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters
AutoShareServer
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters
AutoShareWks
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters
AutoShareServer
0
HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotAlloxXPSP2
1
HKLM\SOFTWARE\Microsoft\OLE
EnableDCOM
"N"
W32/Tilebot-AP may also set entries in the registry at the following 
locations:
HKLM\SYSTEM\CurrentControlSet\Control\
WaitToKillServiceTimeout
W32/Tilebot-AP attempts to remove network shares from the infected 
computer, as well as changing the policy for SeNetworkLogonRight for 
the computer.
W32/Tilebot-AP may attempt to contact scripts on remote sites.
The following registry entries are created as a result of registering 
the system service:
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_IPTABLE
<several entries>
HKLM\SYSTEM\CurrentControlSet\Services\IPtable
<several entries>
Name   W32/Esbot-B
Type  
    * Worm
How it spreads  
    * Network shares
Affected operating systems  
    * Windows
Side effects  
    * Allows others to access the computer
    * Installs itself in the Registry
Aliases  
    * Backdoor.Win32.IRCBot.es
    * W32/IRCbot.worm.gen
    * Backdoor.Trojan
Prevalence (1-5) 2
Description
W32/Esbot-B is a worm and IRC backdoor Trojan for the Windows platform.
W32/Esbot-B will connect to an IRC channel and wait for instructions.
Advanced
W32/Esbot-B is a worm and IRC backdoor Trojan for the Windows platform.
W32/Esbot-B will connect to an IRC channel and wait for instructions.
When first run W32/Esbot-B copies itself to <Windows>\services32.exe.
The file services32.exe is registered as a new system driver service 
named "Content List Management Sub System", with a display name of 
"services32" and a startup type of automatic, so that it is started 
automatically during system startup. Registry entries are created 
under:
HKLM\SYSTEM\CurrentControlSet\Services\Content List Management Sub System\
The following registry entry is set:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions
Melt
<pathname of the Trojan executable>
Name   W32/Bagle-BS
Type  
    * Worm
How it spreads  
    * Email attachments
Affected operating systems  
    * Windows
Side effects  
    * Forges the sender's email address
    * Uses its own emailing engine
    * Downloads code from the internet
    * Installs itself in the Registry
Prevalence (1-5) 2
Description
W32/Bagle-BS is a worm for the Windows platform.
W32/Bagle-BS sends a ZIP file as an email attachment. The ZIP file 
contains an executable detected as Troj/BagleDl-W. When run, this 
executable attempts to download further files, which may include 
copies of the original worm W32/Bagle-BS.
W32/Bagle-BS may download and run further malicious code, storing the 
downloaded file as re_file.exe in the Windows system folder.
Messages sent by W32/Bagle-BS have the following characteristics. The 
subject line is blank. The message text is chosen to be one of the 
following lines:
info
texte
The password is <image>
Password: <image>
The attachment name is chosen from the following:
Business.zip
Business_dealing.zip
Health_and_knowledge.zip
Info_prices.zip
max.zip
sms_text.zip
text_sms.zip
The_new_prices.zip
The worm will avoid sending emails to addresses containing any of the 
following strings:
@derewrdgrs
@eerswqe
@messagelab
@microsoft
anyone@
certific
contract@
f-secur
free-av
gold-certs@
google
icrosoft
listserv
nobody@
noone@
noreply
postmaster@
rating@
samples
support
update
winrar
winzip
Advanced
W32/Bagle-BS is a worm for the Windows platform.
W32/Bagle-BS sends a ZIP file as an email attachment. The ZIP file 
contains an executable detected as Troj/BagleDl-W. When run, this 
executable attempts to download further files, which may include 
copies of the original worm W32/Bagle-BS.
W32/Bagle-BS may download and run further malicious code, storing the 
downloaded file as re_file.exe in the Windows system folder.
Messages sent by W32/Bagle-BS have the following characteristics. The 
subject line is blank. The message text is chosen to be one of the 
following lines:
info
texte
The password is <image>
Password: <image>
The attachment name is chosen from the following:
Business.zip
Business_dealing.zip
Health_and_knowledge.zip
Info_prices.zip
max.zip
sms_text.zip
text_sms.zip
The_new_prices.zip
The worm will avoid sending emails to addresses containing any of the 
following strings:
@derewrdgrs
@eerswqe
@messagelab
@microsoft
anyone@
certific
contract@
f-secur
free-av
gold-certs@
google
icrosoft
listserv
nobody@
noone@
noreply
postmaster@
rating@
samples
support
update
winrar
winzip
When first run W32/Bagle-BS copies itself to <System>\windll2.exe. 
The following registry entries are created:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ru1n
erthegdr
<System>\windll2.exe
HKCU\Software\Microsoft\Windows\CurrentVersion\Ru1n
erthegdr
<System>\windll2.exe
W32/Bagle-BS attempts to delete registry entries from the following 
locations:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ru1n
HKCU\Software\Microsoft\Windows\CurrentVersion\Ru1n
Entries are deleted if they have any of the following names:
9XHtProtect
Antivirus
EasyAV
FirewallSvr
HtProtect
ICQ Net
ICQNet
Jammer2nd
KasperskyAVEng
MsInfo
My AV
Norton Antivirus AV
PandaAVEngine
service
SkynetsRevenge
Special Firewall Service
SysMonXP
Tiny AV
Zone Labs Client Ex
W32/Bagle-BS terminates the following processes:
1t1epad.exe
t1es1t.exe
Name   Troj/WowPWS-A
Type  
    * Spyware Trojan
Affected operating systems  
    * Windows
Side effects  
    * Steals information
    * Installs itself in the Registry
Aliases  
    * PWSteal.Wowcraft.B
    * BackDoor-CUQ
Prevalence (1-5) 2
Description
Troj/WowPWS-A is a password stealing Trojan for the Windows platform.
Troj/WowPWS-A targets the online game World of Warcraft, and attempts 
to steal account details.
Advanced
Troj/WowPWS-A is a password stealing Trojan for the Windows platform.
Troj/WowPWS-A targets the online game World of Warcraft, and attempts 
to steal account details.
When first run Troj/WowPWS-A copies itself to the following locations:
<Windows folder>\smss.exe
<Windows folder>\finder.com
<Windows folder>\explorer.com
<Windows folder>\exeroute.exe
<Windows folder>\1.com
<Windows system folder>\msconfig.com
<Windows system folder>\rundll32.com
<Windows system folder>\command.pif
<Windows system folder>\dxdiag.com
<Windows system folder>\regedit.com
<Windows system folder>\finder.com
<Windows folder>Debug\DebugProgram.exe
<Program Files>\Internet Explorer\iexplor.com
<Program Files>\Common Files\iexplore.pif
Troj/WowPWS-A sets the following registry entries to start the 
various copies of itself:
HKCR\winfiles\Shell\Open\Command
<Windows folder>\exeroute.exe "%1" %*
HKLM\SOFTWARE\Clients\StartMenuInternet\iexplore.pif
LocalizedString
iexplore
HKLM\SOFTWARE\Clients\StartMenuInternet\iexplore.pif\shell\open\command
<Program Files>\Common Files\iexplore.pif
HKLM\SOFTWARE\Windows\CurrentVersion\Run
Torjan Program
<Windows folder>\smss.exe
Name   W32/Mytob-FI
Type  
    * Worm
How it spreads  
    * Email attachments
Affected operating systems  
    * Windows
Side effects  
    * Turns off anti-virus applications
    * Allows others to access the computer
    * Sends itself to email addresses found on the infected computer
    * Forges the sender's email address
Aliases  
    * Net-Worm.Win32.Mytob.bm
    * W32.Mytob.EE@mm
Prevalence (1-5) 2
Description
W32/Mytob-FI is a mass-mailing worm and backdoor Trojan that can be 
controlled through the Internet Relay Chat (IRC) network.
W32/Mytob-FI spreads through email. W32/Mytob-FI harvests email 
addresses from files on the infected computer and from the Windows 
address book. Email sent by W32/Mytob-FI has the following properties:
Subject line:
Your password has been updated
Your password has been successfully updated
You have successfully updated your passworq
Your new account password is approved
Your Account is Suspended
*DETECTED* Online User Violation
Your Account is Suspended For Security Reasons
Warning Message: Your services near to be closed.
Important Notification
Members Support
Security measures
Email Account Suspension
Notice of account limitation
Message text:
Dear user <str>,
You have successfully updated the password of your <str> account.
If you did not authorize this change or if you need assistance with 
your account, please contact <str> customer service at: <str>
Thank you for using <str>!
The <str> Support Team
+++ Attachment: No Virus (Clean)
+++ <str> Antivirus - www.<str>
Dear user <str>,
It has come to our attention that your <str> User Profile ( x ) 
records are out of date. For further details see the attached document.
Thank you for using <str>!
The <str> Support Team
+++ Attachment: No Vi
 |