REMOVING SPYWARE/ADWARE/VIRUS

Home
Remove 180search Assistant/AND others
Disabling or enabling Windows Me System Restore/Windows XP
security advisories
AROURA
LINKS
Articles

checkmark.gif

logo.jpg

Acceptance Mark



XCP.Sony.Rootkit





The following are the Spyware Encyclopedia pages for the pests which relate to Sony BMG's rootkit-based Digital Rights Management software, which is being distributed on audio CDs. These CDs install the pest XCP.Sony.Rootkit, which is a trojan that opens security vulnerabilities through rootkit functionality. They also launch Music Player, which is a media player that phones home to Sony BMG, sending information which could be used to compile profiles of the CDs played on a given computer.



XCP.Sony.Rootkit



Music Player





Sony BMG and First4Internet have released multiple versions of a service pack 2 patch and provided an uninstaller ActiveX. The patch removes the rootkit functionality and closes the security vulnerability, but fails the eTrust PestPatrol scorecard on other points that consumers should be aware of prior to installing it. Even after being patched, the DRM software continues to fail the scorecard.



XCP.Sony.Rootkit.Patch



XCP.Sony.SP2



Computer Associates has received uninstaller links from First4Internet, writing on behalf of Sony BGM. It is an ActiveX control. Analysis shows that the uninstaller verifies that it is on the same system which ran the initial ActiveX control as part of the uninstaller request process. In addition, each link provided by First4Internet can only be used once for a succesful uninstall. This effectively prevents easy redistribution of the uninstaller, and requires everyone who wishes to receive the uninstaller to do so through Sony BMG's official process, which involves releasing personally identifiable information for marketing use by Sony BMG and undisclosed third parties. Early versions of the uninstaller were less reliable, and could leave a running service behind, not fully uninstalling the software. This appears to have been corrected in later versions of the software, which do remove all active components of the trojan. Even in later versions, however, some registry keys remain behind.



Neither the patch nor the uninstaller ActiveX control remove the phone home technology from Music Player. Music Player continues to pose the same privacy risks after their installation/execution as it did before.









Latest Spyware Alerts





> XCP.Sony.Rootkit (New!)





Latest Virus Alerts











Our Spyware Information Center is your complete resource for protecting your business against Spyware and Pests



** HATE TO SAY IT BUT YOU WHO HAVE LIMEWIRE YA ITS SPYWARE**

Overview
Summary
A peer network used primarily for music file sharing. In an organization, can degrade network performance and consume vast amounts of storage. Is distributed with many spyware/adware products bundled in.

Vendor Description
Lime Wire LLC is dedicated to building advanced file-sharing client/server software which will connect computing devices over public and private networks. Our team of developers hails from some of the world's most highly-regarded academic and professional institutions, such as MIT, Columbia, Goldman Sachs, Merrill Lynch, CIBC Oppenheimer, and Compaq. Lime Wire LLC is a wholly owned subsidiary of the Lime Group, a technology incubator based in downtown New York City. Lime Wire LLC, a New York based Limited Liability Company, was founded in August, 2000. Lime Wire was founded to develop technologies to develop and profit from the formation of worldwide peer-to-peer networks across the internet. At current, Lime Wire has the world's largest team of developers building applications for the Gnutella network. Lime Wire's first product, a software package named LimeWire, is a powerful and scalable serverless networking software that enables entities on the internet to share, search for, and obtain files via the Gnutella Network. LimeWire has already achieved considerable popularity, having been downloaded more than 3,000,000 times as of 5/30/01, including 250,000 downloads during the week of May 19-25. A recent PC Pitstop study shows that Lime Wire resides on over 1.5% of PCs worldwide. The LimeWire software was designed to be free to individual users, in order to accelerate the growth of the network as a whole and introduce people to the power of peer-to-peer networks. Although LimeWire currently is being used mainly for file-sharing, LimeWire has the potential to become an informational tool with capabilities beyond those currently existing on the Internet, such as the World Wide Web. Content-serving entities on a peer-to-peer network will be able to respond to queries with dynamically generated, real-time information. Search requestors will be able to query and draw data directly from one or more databases, without having to navigate through several bulky web interfaces. Search requestors will also be able to communicate with multiple computers simultaneously, and preselect the type and form of information they will receive in response to their requests. Lime Wire is already building the technologies to communicate over peer-to-peer networks though structured metadata queries, transcending the text-based search capabilities of the World Wide Web and the current Gnutella network.

Category
Adware : Software that displays popup/popunder ads when the primary user interface is not visible or which do not appear to be assocaited with the product.

Adware: Software that displays popup/popunder ads when the primary user interface is not visible or which do not appear to be assocaited with the product.





Origins
Date of Origin
March, 2002



Distribution
Limewire: 0.8%


Clot Factor
Limewire: 42


Growth
Limewire: Insufficient data to report growth




Operation
Storage Required
Limewire: at least 6225KB




Detections:
List of Objects Present:
PestPatrol detects the following files and registry entries for this software..





Autorun References:

HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\limeshop



Registry Items:


HKEY_CURRENT_USER\software\microsoft\internet explorer\menuext\limeshop preferences
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\menuorder\start menu\programs\limewire
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata\s-1-5-18\components\9e11dbbf317d89b4f92af7d63ab22d26
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata\s-1-5-18\components\a8cebe6cec02c7d40a450c6455a6ad2e
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata\s-1-5-18\components\c0da82cffcfbb79419d1189c955ee262
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\limeshop
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls\c:\program files\limewire\2.9.8\bet.url
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls\c:\program files\limewire\2.9.8\bonzi.url
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls\c:\program files\limewire\2.9.8\browserpage.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls\c:\program files\limewire\2.9.8\limeshop.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls\c:\program files\limewire\2.9.8\limeshop.html
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls\c:\program files\limewire\2.9.8\limeshop.url
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls\c:\program files\limewire\2.9.8\limewire.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls\c:\program files\limewire\2.9.8\limewire.jar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls\c:\program files\limewire\2.9.8\money.url
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls\c:\program files\limewire\2.9.8\root\magnet10\options.js
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\limeshop.xml
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\limewire

Directories:

commonprograms+\limewire
programfilesdir+\limeshop
programfilesdir+\limewire

 

W32.Peerload.A


W32.Peerload.A

Here we will present information concerning W32.Peerload.A and clones.
This info can contain information about removal tools, short info and links to the AV producer who reported the virus.

W32.Peerload.A is reported by Symantec.

Created: 2005-09-19
Short Info: W32.Peerload.A is a worm that spreads through file-sharing networks, such as Kazaa, eMule, Shareaza, and iMesh.
Removal tool:
If you have been infected We would recommend that you perform an online scan or buy an antivirusprogram. Here is more information about antivirusprograms:
Antivirus programs

More info: W32.Peerload.A @ Symantec
Aliases: WORM_P2LOAD.A, P2load.A,
Viruses/Clones:



Information concerning W32.Peerload.A comes from third party unless.
Information is gathered automatically and therefore there might contain minor inconsistencies.
For information about more viruses please see Virusakuten
Trojan.Win32.Dialer.hc Overview Summary This is an adult premium content dialer that pops up ads. Category DEALERS>>Pest Name Category Release Date Aliases 00d Dialer Dialer 6/24/2003 00d Dialer 23aw0001 Dialer Dialer 11/14/2003 23aw0001 Dialer 764 Dialer Dialer 2/18/2004 764 Dialer Access Dialer 11/19/2002 Access AccessMembre Dialer 11/16/2003 AccessMembre AccessPlugin Dialer 6/24/2003 AccessPlugin Aconti Dialer 7/28/2003 Aconti Active Strip Setup Dialer 7/22/2003 Active Strip Setup Activex Dialer.3 Dialer 7/7/2003 Activex Dialer.3 Activex Dialer.4 Dialer 7/7/2003 Activex Dialer.4 Activex Dialer.6 Dialer 7/7/2003 Activex Dialer.6 Activex Dialer.7 Dialer 7/7/2003 Activex Dialer.7 Activex Dialer.9 Dialer 7/7/2003 Activex Dialer.9 Adult Content Dialer Dialer 6/24/2003 Adult Content Dialer Adult_Chat dialer Dialer 8/31/2003 Adult_Chat dialer Adultoweb Dialer Dialer 6/24/2003 Adultoweb Dialer All-In-One Telcom Dialer 3/1/2003 All-In-One Telcom Alyon Dialer 8/23/2003 Alyon Apropos Dialer 6/13/2005 Apropos Beyond telecom Dialer 6/10/2005 Beyond telecom BillByCall Dialer BillByCall Blank Dialer Dialer 10/25/2002 Blank Dialer Bloiscom Dialer Dialer 10/1/2003 Bloiscom Dialer Bobbie Dialer 4/12/2003 Bobbie Bobbie Dialer Dialer 6/6/2004 Bobbie Dialer BTV Dialer Dialer 4/8/2005 BTV Dialer Canada.Exe 1.0 Dialer Canada.Exe 1.0 Carpe Diem Dialer 7/27/2004 Carpe Diem CashDialer Dialer 6/6/2004 CashDialer Cat Dialer 3/6/2004 Cat Central-24 Dialer Dialer 9/9/2003 Central-24 Dialer Coder Dialer Dialer 7/26/2004 Coder Dialer Connect2Party Dialer 5/28/2002 Connect2Party Coulomb Dialer Dialer 3/18/2005 Coulomb Dialer Crush Dialer Dialer 1/1/2001 Crush Dialer DasHackerArchiv Dialer Dialer 8/3/2002 DasHackerArchiv Dialer DateMakerItaly Dialer 9/19/2003 DateMakerItaly DDialer Dialer 4/5/2005 DDialer Desire Dialer 8/6/2002 Desire Dialer Dialer 6/13/2005 Dialer Dialer.153 Dialer 10/28/2005 Dialer.153 Dialer.Coulomb Dialer 10/25/2005 Dialer.Coulomb Dialer.Dbaccess Dialer 6/9/2005 Dialer.Dbaccess Dialer.DerBiz Dialer 6/2/2005 Dialer.DerBiz Dialer.GC Dialer Dialer.GC Dialer.Gen Dialer Dialer.Gen Dialer.InstantAccess Dialer 10/28/2005 Dialer.InstantAccess Dialer.JR Dialer Dialer.JR Dialer.JS Dialer Dialer.JS Dialer.JT Dialer Dialer.JT Dialer.JU Dialer Dialer.JU Dialer.KD Dialer Dialer.KD Dialer.QT Dialer Dialer.QT DialerActiveX Dialer 6/24/2003 DialerActiveX DialerFactory Dialer DialerFactory Dialer-Offline Dialer 12/31/2002 Dialer-Offline DialPass Dialer 6/24/2003 DialPass DialXS Dialer 6/24/2003 DialXS DirektDialer Dialer 7/18/2004 DirektDialer Dluca Dialer 12/10/2003 Dluca Dluca.B Dialer 1/1/2004 Dluca.B EGroup Dialer Dialer EGroup Dialer E-Group Sex Dialer Dialer 3/1/2004 E-Group Sex Dialer Eleena Dialer 2/2/2005 Eleena ePlugin Dialer 6/24/2003 ePlugin Eroskop Dialer Dialer 6/24/2003 Eroskop Dialer ERRN Dialer 12/20/2003 ERRN EZ 1-2-3 Dialer 2/27/2003 EZ 1-2-3 FactoryNetwork Dialer Dialer 9/4/2003 FactoryNetwork Dialer FairyTale Dialer 6/24/2003 FairyTale Family Sex Dialer Dialer 8/19/2002 Family Sex Dialer Filmati Dialer Dialer 9/1/2003 Filmati Dialer France Sex Dialer 11/12/2002 France Sex GBDialer Dialer 9/21/2005 GBDialer GDY3M Adult Dialer Dialer 12/13/2003 GDY3M Adult Dialer Generic Dialer Dialer 7/22/2003 Generic Dialer Global Dialer Dialer Global Dialer Global Netcom Inc Dialer 1/11/2004 Global Netcom Inc GMSoft Dialer Dialer 3/1/2004 GMSoft Dialer Go In Dialer 12/11/2001 Go In Hacker Spider Dialer 9/14/2003 Hacker Spider HackerSpider Dialer Dialer 3/24/2005 HackerSpider Dialer HaczYK Dialer HaczYK Hardcore Dialer Dialer 2/6/2004 Hardcore Dialer HighSpeed Connector Dialer 3/3/2004 HighSpeed Connector Holystic Dialer 12/1/2003 Holystic Holystic-Dialer Dialer 1/1/2004 Holystic-Dialer Hot as Hell Dialer 1/20/2003 Hot as Hell Hot Canada Dialer 9/2/2003 Hot Canada IBS Dialer IBS IEAccess Dialer 5/2/2003 IEAccess IEDial Dialer 6/24/2003 IEDial IEDisco Dialer 7/21/2003 IEDisco Instant Access Dialer 2/3/2004 Instant Access Interfun Dialer Dialer 6/24/2003 Interfun Dialer IQ-Test Dialer 3/24/2005 IQ-Test Jab Dialer Dialer 10/1/2003 Jab Dialer Kitten Free Sex Dialer Kitten Free Sex Kruszynka Porn Dialer Dialer 2/3/2003 Kruszynka Porn Dialer Leggi-Messaggi-1 Dialer 7/22/2003 Leggi-Messaggi-1 ADWARE>> Pest Name Category Release Date Aliases 123 Messenger Adware 12/17/2003 123 Messenger 123Mania Adware 8/15/2005 123Mania 12Trojan.Win32.Krepper.ab Adware 12Trojan.Win32.Krepper.ab 180SearchAssistant Adware 7/3/2005 180SearchAssistant 180Solutions Adware 6/13/2005 180Solutions 2nd Thought Adware 5/2/2005 2nd Thought 411Ferret Adware 12/15/2005 411Ferret 7000n Adware 4/15/2005 7000n 8848 Adware 4/12/2005 8848 ABetterInternet Adware 11/10/2004 ABetterInternet ABetterInternet.Aurora Adware 4/26/2005 ABetterInternet.Aurora ABetterInternet.Ceres Adware 5/26/2005 ABetterInternet.Ceres ABetterInternet.DrPMon Adware 7/20/2005 ABetterInternet.DrPMon AbetterInternet.ImGiant Adware 7/11/2005 AbetterInternet.ImGiant Abetterinternet.Transponder Adware 7/26/2005 Abetterinternet.Transponder Ace Club Casino Adware 10/25/2002 Ace Club Casino AceNotes Free Adware 8/13/2002 AceNotes Free ActiveSearch Adware 10/13/2004 ActiveSearch AdBars Adware 7/22/2004 AdBars AdBlaster Adware 3/12/2004 AdBlaster Adchannel Adware Adchannel AdClicker 1.0 Adware 6/28/2005 AdClicker 1.0 AdDestroyer Adware 8/25/2003 AdDestroyer Addictive Adware 5/5/2005 Addictive AdHelper Adware 12/15/2004 AdHelper AdManager Adware 1/15/2005 AdManager Admilli Service Adware 3/22/2005 Admilli Service AdPartner Adware 12/28/2004 AdPartner Ad-Popper Adware 6/26/2003 Ad-Popper AdRoad.Cpr Adware 12/1/2003 AdRoad.Cpr AdRoar Adware 4/24/2005 AdRoar AdRotator Adware 12/1/2003 AdRotator AdShooter.SearchForIt Adware 3/28/2005 AdShooter.SearchForIt Adsrve Adware 6/29/2005 Adsrve AdsStore Adware 12/1/2003 AdsStore AdStatus Service Adware 5/23/2005 AdStatus Service adtools Adware 2/14/2005 adtools Adult Material Adware Adult Material AdURL Adware 7/19/2005 AdURL AdvertBar Adware 8/1/2003 AdvertBar AdvSearch Adware 8/1/2004 AdvSearch Advware.Adstart.b Adware 8/13/2004 Advware.Adstart.b Advware.BetterInternet Adware 10/4/2004 Advware.BetterInternet Adware.Binet Adware Adware.Binet Adware.IEPageHelper Adware 5/13/2004 Adware.IEPageHelper adware.sqwire Adware 4/28/2005 adware.sqwire Alset Network Adware Alset Network Aolps-hp.Trojan Adware Aolps-hp.Trojan ArmBender Adware ArmBender ATGames Adware 6/30/2005 ATGames AtHoc Adware 10/20/2003 AtHoc Attune Adware Attune Atztecmarketing.syscpy Adware Atztecmarketing.syscpy AUpdate Adware AUpdate Aureate Group Mail Adware 6/6/2003 Aureate Group Mail Aveo Adware 8/1/2003 Aveo avirtexp.exe Adware avirtexp.exe AVPDOS32.exe: NOT a Pest Adware AVPDOS32.exe: NOT a Pest BargainBuddy Adware 6/8/2005 BargainBuddy BDE Projector Adware 1/1/2003 BDE Projector BDHelper Adware BDHelper Begin2Search Adware 6/7/2005 Begin2Search Best Phrases Adware 12/1/2003 Best Phrases Best Phrases.variant Adware Best Phrases.variant Best search Adware 5/23/2005 Best search Bonzi Adware 2/1/2004 Bonzi BookmarkExpress Adware 8/1/2004 BookmarkExpress BrowserToolbar Adware 12/31/2002 BrowserToolbar BTGrab Adware 4/5/2005 BTGrab BuddyLinks Adware 2/16/2004 BuddyLinks Bullguard Popup Ad Adware 10/10/2004 Bullguard Popup Ad C2.Lop Adware 1/15/2004 C2.Lop CasClient Adware 6/29/2005 CasClient CashBar Adware CashBar CashSaver Adware 6/20/2005 CashSaver CashToolbar Adware 12/31/2002 CashToolbar CasinoClient Adware 8/3/2005 CasinoClient CasinoOnNet Adware 6/19/2004 CasinoOnNet CasinoRewards Adware CasinoRewards ChannelUp Adware 8/21/2004 ChannelUp Checkin Adware Checkin Checkin.A Adware 6/1/2003 Checkin.A Checkin.B Adware 6/1/2003 Checkin.B Claria.CommonComponents Adware 7/18/2005 Claria.CommonComponents Claria.Date Manager Adware Claria.Date Manager Claria.ewallet Adware 12/9/2004 Claria.ewallet Claria.GotSmiley Adware Claria.GotSmiley Claria.Precision Time Adware 2/16/2005 Claria.Precision Time Claria.Screenscenes Adware Claria.Screenscenes Claria.Weatherscope Adware 12/2/2004 Claria.Weatherscope Claria.WebSecureAlert Adware 4/8/2004 Claria.WebSecureAlert ClickSpring Adware 4/22/2005 ClickSpring ClickSpring.PurityScan Adware 8/2/2004 ClickSpring.PurityScan ClickTheButton Adware 12/31/2002 ClickTheButton ClipGenie Adware 8/1/2004 ClipGenie combrepl.dll Adware 1/31/2004 combrepl.dll CometCursor Adware 8/2/2004 CometCursor Common Dialogs Adware Common Dialogs Conducent FlexPak Adware 1/25/2004 Conducent FlexPak CoolSavings Adware 11/4/2004 CoolSavings * NOTE IF ANY ONE NEEDS INFORO DROP ME A EMAIL AND ILL LET YOU KNOW*

 
Trojan Name Risk Assessment
Sniff-ProxyAuth
Corporate User : Low
Home User : Low

Trojan Information
Discovery Date: 08/19/2005
Origin: Unknown
Length: 152,616 (dll) 64,796 (dll)
Type: Trojan
SubType: Spyware
Minimum DAT: 4563 (08/19/2005)
Updated DAT: 4564 (08/22/2005)
Minimum Engine: 4.3.20
Description Added: 08/21/2005
Description Modified: 08/21/2005 11:38 PM (PT)
Description Menu
Trojan Characteristics
Symptoms
Method Of Infection
Removal Instructions
Variants / Aliases
Rate This page
Print This Page
Email This Page
Legend

Trojan Characteristics:

This detection covers dll files that can capture system specific information, send the information to caller programs.

The dll exports several functions for other program to use.  Once installed, the dll can hook several system function calls.  Information is monitored and saved to local file.  It creates a name pipe for other trojan program to connect to the machine and upload the file.

Top of Page

Symptoms
The dll can be used by any trojan program.
Top of Page

Method Of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, etc.
Top of Page

Removal Instructions

All Users :
Use current engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).

Additional Windows ME/XP removal considerations

Top of Page

Variants
Name Type Sub Type Differences
Top of Page

Aliases
Name
Top of Page

Virus Information Library Search Center

Malware Advisories Top Threats Security Advisories






MALWARE NAME RISK RATING ADVISORY DATE PATTERN FILE

ELF_LUPPER.C Low 2005-11-16 2.952.01 (CPR)

PE_BOBAX.AK-O Low 2005-11-16 2.952.02 (CPR)

PE_BOBAX.AK Low 2005-11-16 2.952.02 (CPR)

WORM_SOBER.AE Low 2005-11-16 2.952.02 (CPR)

WORM_RONTOKBRO.F Low 2005-11-16 2.952.01 (CPR)

TROJ_KILLFYL.AC Low 2005-11-16 2.952.01 (CPR)

TROJ_DLOADER.ANS Low 2005-11-16 2.952.01 (CPR)

WORM_SOBER.AF Low 2005-11-16 2.951.00

WORM_SDBOT.CQP Low 2005-11-15 2.948.02 (CPR)

WORM_SOBER.AD Low 2005-11-15 2.947.00



Pattern Version: 2.951.00
Release Type: New Malware Threat
Notes: WORM_SOBER.AE,WORM_SOBER.AF



November 16, 2005, 05:56:02 (GMT -08:00)

---------------------
New Virus Detected:
---------------------
There are [18] new virus detected by the pattern file.
All detailed virus names please refer to the list below.

BKDR_PCCLIENT.CJ
BKDR_SINGU.AK
JS_HELPXSITE.F
PERL_SHELLBOT.W
TROJ_DROPPER.SS
TROJ_DROPPER.ST
TROJ_DROPPER.SX
TROJ_STARTPAG.XX
TROJ_STARTPAG.YA
TROJ_VANTI.I
TROJ_VB.VK
TROJ_ZLOB.AM
TSPY_BANCOS.BHJ
TSPY_BANCOS.BHO
TSPY_LINEAGE.QS
WORM_SDBOT.KND
WORM_SOBER.AE
WORM_SOBER.AF


-------------------
Virus Name Changed:
-------------------
Old Virus Name New Virus Name
-------------- --------------

TSPY_LMIR.CF TSPY_LINEAGE.QR

-------------------------
Virus Signature Modified:
-------------------------

TROJ_LINEAGE.DLL
TROJ_STARTPA.DLL
WORM_SOBER.AD
WORM_SPYBOT.BAD


------------------------
Virus Signature Dropped:
------------------------




Home > Security Info > Virus Encyclopedia



Virus Encyclopedia




WORM_BLAXE.A
Blaxe This network worm attempts to share itself to Kazaa, Grokster and Imesh peer-to-peer network. ... exe %1" Then, it creates an the following registry entry to enable to the worm to run at every Windows startup. The worm shares this folder within peer to peer file-sharing networks (Grokster, iMesh, Kazaa) by adding the following values.

BKDR_AGOBOT.JX
Imelda Yap AUTOMATIC REMOVAL INSTRUCTIONS To automatically remove this malware from your system, please use Trend Micro Damage Cleanup Engine and Template. ... exe To enable itself to run at every Windows startup, it adds the following registry entries.

WORM_SDBOT.AE
administrador Administrator ADMINISTRATOR america argentina brasil brazil cambiar carro casaCASA chivas computadora consulado correo cuarto david education email escuela faculty fuckyou futbol hombre james javier jorge manager maria mexico mirror molotov monitor mujer musica network nintendo Penis penis playstation porno ...

WORM_ANTINNY.E
It may also spread via peer to programs by dropping copies of itself into default shared file folders. _autorun _config _loader _login _setup _start It creates the following autostart entry to enable execution at every system startup.

WORM_WINDFILE.A
Delphi This worm uses the peer-to-peer application KAZAA to propogate. exe P2P Network Propagation and Routine This worm uses the KAZAA peer to peer network to propagate. If the Kazaa peer-to-peer client is installed in your system, change the shared folder and the sharing setting to anything other than the settings when the worm entered the system.

WORM_WINDFILE.B
Delphi This worm uses the peer-to-peer application KAZAA to propogate. exe" P2P Network Propagation and Routine This worm uses the KAZAA peer to peer network to propagate. If the Kazaa peer-to-peer client is installed in your system, change the shared folder and the sharing setting to anything other than the settings when the worm entered the system.

SYMBOS_FONTAL.B
The only way to stop the affected mobile phone from restarting again and again is to restore its factory settings. The only way to stop the affected mobile phone from restarting again and again is to restore its factory settings. ... It uses social engineering techniques, in this case pretending to be a Nokia Antivirus application, to trick users into installing SYMBOS_FONTAL.

TROJ_GNUTELMAN.A
Upon execution, this Trojan attaches itself to a peer-to-peer, file-sharing network, GNUTELLA, via port 99. ... A, Gnutella Worm This Trojan connects to a file sharing network, GNUTELLA, and disguises itself as a searched file in that network that allows it to spread to other users who download it.

TROJ_FTAPP.B
Ftapp This non-destructive Trojan, installed via a peer-to-peer sharing program, attempts to monitor the Web browsing activity of a target user and displays advertisements. ... To do this, Trend Micro customers must download the latest pattern file and scan their system.

TROJ_TUIL.A
It may possibly reach systems via email, Instant Messenger, network shares, mapped drives, and peer-to-peer file-sharing networks. ... This malware creates a registry entry to automatically load its copy every system startup but errors in the malware code prevents it from doing so.



Home > Security Info > Virus Encyclopedia



Virus Encyclopedia



10 - 20 of more than 500 records match your query
WORM_BENJAMIN.A
Filler, W32/Kazoa This destructive worm propagates through the Kazaa network, a peer-to-peer file exchange network. ... Payloads This worm stays in memory to continuously process its destructive payload, which is to fill an infected user's hard disk drive for as long as Windows permits the creation of files.

WORM_SHERMNAR.A
exe This worm also attempts to propagate by copying itself to any accessible, peer-to-peer KaZaA file-sharing network drive. ... Default\Software\Kazaa This worm propagates by copying itself to any accessible, peer-to-peer (P2P) KaZaA file-sharing network drive.

WORM_KAZMOR.A
... 14 Year old webcam 15 year old webcam 16 year old webcam 12 year old forced rape cum girls gone wild Devon - Elevator Scene I Deep Throat Kelly Another bang bus victim forced rape sex cum ZoneAlarm Firewall WinZip Key Generator and Crack How to be a terrorist Government Secrets Nero Burning ROM Cracked Teen Violent Forced Gangbang PS1 Boot Disc Sony P...

WORM_KWBOT.A
EXE To propagate, this worm drops a copy of itself in the shared folder of KaZaA Media Desktop, a peer-to-peer application for sharing files with other users on the Internet. ... WORM This Internet worm propagates through KaZaA, a peer-to-peer file sharing utility.

WORM_DANDI.A
Unidadworm AUTOMATIC REMOVAL INSTRUCTIONS To automatically remove this malware from your system, please refer to the Trend Micro Damage Cleanup Engine and Template. ... If the KaZaA peer-to-peer file sharing utility is installed on the system, the said.

WORM_COWBOT.13
This worm also has the ability to spread through KaZaa peer-to-peer (P2P) shared network. ... Then it creates the following registry entries to auto execute at every system startup and enable its Internet Relay Chat RoBOT (IRC BOT for short) to function.

WORM_SURNOVA.A
File-Sharing/Peer-to-Peer Applications This worm then attempts to modify this registry entry to point to the Windows Media folder. ... Supova This memory-resident worm uses Microsoft Messenger (MSN) and Kazaa peer-to-peer (P2P) application to propagate itself.

WORM_SURNOVA.B
It propagates through file sharing via the KaZaA peer-to-peer application and the Microsoft Messenger (MSN). Upon execution, this worm copies itself to the following files in the Windows directory and in the Windows Media directory. ... This makes it possible for the worm to execute automatically on every startup.

WORM_REDERPS.A
MORPHeus, KaZaA Media Desktops, Bearshare, and eDonkey 2000 are peer-to-peer applications which allow users to search files across the network for downloads and share their own files for other users to download. ... SPREADER This worm makes multiple copies of itself in the default shared directory of peer-to-peer (P2P) applications such as BearShare, KaZaA Media Desktops, MORPHeus, and eDonkey 2000.

WORM_SURNOVA.D
It uses the Microsoft Messenger (MSN) and the Kazaa peer-to-peer (P2P) application to propagate. Upon execution, this worm copies itself to the following files in the Windows directory and in the Windows Media directory. ... This makes it possible for the worm to execute automatically on every startup.




Home > Security Info > Virus Encyclopedia



Virus Encyclopedia



20 - 30 of more than 500 records match your query
WORM_SURNOVA.F
It propagates copies of itself using MSN Messenger and the Kazaa peer-to-peer (P2P) application. exe It then check whether Kazaa, a peer-to-peer file sharing application that allows sharing of files with other users over the Internet, is installed on the system.

WORM_SURNOVA.G
It propagates copies of itself via the Kazaa peer-to-peer (P2P) application. ... exe %Windows% refers to the Windows directory, which is usually located at C. To do this, Trend Micro customers must download the latest pattern file and scan their system. Removing Autostart Entries from the Registry Removing autostart entries from the registry prevents the malware from executing during startup.

WORM_KAZDIR.A
This worm, written in Borland Delphi, propagates via the Kazaa peer-to-peer file sharing network. ... It creates the following registry entries to enable file sharing in Kazaa, and to share the folder containing the dropped worm copy. ... This worm virus has been renamed to WORM_SAMBUD.

WORM_KWBOT.B
To propagate, this worm copies itself in the shared folder of the KaZaA Media Desktop, a peer-to-peer application for sharing files with other users on the Internet. ... This Internet worm propagates via Kazaa, a peer-to-peer file sharing utility. ... To do this, Trend Micro customers must download the latest pattern file and scan their system.

WORM_SURNOVA.C
It propagates via MSN Messenger and Kazaa, a peer-to-peer application, which enables users to share files over a network. ... In the left panel, navigate to the Windows directory, which is usually C. To do this, Trend Micro customers must download the latest pattern file and scan their system.

WORM_ENERKAZ.A
a This Win32 Internet worm spreads via Kazaa, the peer-to-peer application which allows users to share files over a network. ... AUTOMATIC REMOVAL INSTRUCTIONS To automatically remove this malware from your system, please use Trend Micro Damage Cleanup Engine and Template.

WORM_ENERKAZ.B
Sambud This worm spreads via the peer-to-peer file-sharing network. This is a worm that spreads through a KaZaA peer-to-peer file sharing program. ... It creates the registry to direct the sharing folder to the newly created folder called %Windows%\Sys32. *Where %Windows% refers to the Windows directory, which is usually located in C.

BAT_LILTRICK.A
A This nondestructive batch file worm propagates via Kazaa, the popular peer-to-peer application, which allows users to share files over a network. This file contains its autostart entry, which it adds to existing registry settings to enable its automatic execution upon system startup.

BAT_MIGRATE.A
BAT It also spreads via Internet Relay Chat (IRC), DCC (Direct Client Connection) Send, and Kazaa, the peer-to-peer file application which allows users to share files over a network. vbs %Current directory%\ u4q3 %Current directory%\ f8i4 %Current directory%\ m0q4 %Current directory%\ f3 GREETING.

WORM_ENERKAZ.C
This is an intended worm designed to propagate via the Kazaa peer-to-peer file-sharing network. ... To do this Trend Micro customers must download the latest pattern file and scan their system. To do this Trend Micro customers must download the latest pattern file and scan their system.





Descriptions for Newly Discovered Threats (Includes Viruses, Trojans and Hoaxes)
Name Date Discovered Home Risk Corporate Risk Included In DAT
Reboot-AP.bat 09/08/2005 Low Low 4577
Reboot-AP 09/07/2005 Low Low 4577
BAT/KillAV 09/07/2005 Low Low 4577
Adware-LNK.gen 08/26/2005 N/A N/A 4568
W32/Reatle.f@MM 08/25/2005 Low Low 4568
BackDoor-CUC 08/24/2005 Low Low 4566
BackDoor-CUC.dr 08/24/2005 Low Low 4566
Adclicker-DF 08/22/2005 N/A N/A 4565
W32/Zotob.worm.d 08/22/2005 Low Low 4564
Sniff-ProxyAuth 08/19/2005 Low Low 4563
New Malware.q 08/18/2005 Low Low 4562
W32/Bozori.worm.b 08/17/2005 Low Low 4561
W32/Sdbot.worm!51326 08/16/2005 Low Low 4561
W32/IRCbot.worm!MS05-039 08/16/2005 Low-Profiled Low-Profiled 4560
W32/Zotob.worm!hosts 08/16/2005 Low Low 4559
W32/Mydoom.bv@MM 08/16/2005 Low Low 4559
W32/Zotob.worm.c 08/16/2005 Low Low 4559
W32/Zotob.worm.gen 08/15/2005 Low Low 4558
W32/Zotob.worm.b 08/14/2005 Low Low 4558
W32/Sdbot.worm!MS05-039 08/14/2005 Low Low 4558
W32/Zotob.worm 08/14/2005 Low Low 4558
JS/Downloader-AED 08/13/2005 N/A N/A 4558
Adware-SpywareWall 08/12/2005 N/A N/A 4558
Adware-AliToolbar 08/12/2005 N/A N/A 4557
NTRootkit-L 08/09/2005 N/A N/A 4555

 

Alias: SurfSideKick 2

Threat type: Adware - Adware is generally software that displays advertisements. Some advertisers may covertly install adware on your system and generate a stream of unsolicited advertisements that can clutter your desktop and affect your productivity. The advertisements may also contain pornographic or other material that you might find inappropriate. The extra processing required to track you or to display advertisements can tax your computer and hurt your system performance.

Advice: Remove This is a very high risk threat and should be removed immediately as to prevent harm to your computer or your privacy.

Threat risk: Elevated Risk
Elevated threats are usually threats that fall into the range of adware in which data about a user's habits are tracked and sent back to a server for analysis without your consent or knowledge.

Description:

Author: NULL

Author URL:

Author description:

SurfSideKick Signature Details: The following information includes some of the standard signatures* associated with this spyware threat. Please do not attempt to manually remove these items from your computer; Removing these items incorrectly or partially can cause your computer to experience critical errors, prevent your computer from restarting or cause loss of Internet connectivity. Should you be infected with SurfSideKick, you can clean your machine of this spyware threat for free by downloading CounterSpy now.

Running Process Signatures:
process: Ssk.exe: MD5 Hash: aecf81d333166bdabe0...
process: ssk.exe: MD5 Hash: c434f027d27e93b8e33...
process: SSK_B5.EXE: MD5 Hash: 508870ff6cf581d67bc...
process: VT00.exe: MD5 Hash: dae4e35b6a1d0d641e6...
process: ssk3_b5 seedcorn 4.exe: MD5 Hash: 881e92ee6e37ebc6398...
process: ssk3_b5 seedcorn 4.exe: MD5 Hash: f4b517e9b17959362fd...
process: ssk.exe: MD5 Hash: 54eaeb04e9d11f50d6e...
process: ssk3_b5 felly media 11.exe: MD5 Hash: ff27f918acc9c875cfd...
process: wintask.exe: MD5 Hash: f660d7a76423ad2a72e...
process: sskupdater3.exe: MD5 Hash: 7558085aecec1dc973e...
process: ssk3_b5.exe: MD5 Hash: 797836b365edcb38f9f...
process: ssk3_b5 seedcorn 4.exe: MD5 Hash: f4b517e9b17959362fd...
process: sskupdater3.exe: MD5 Hash: ...
process: exp.exe: MD5 Hash: f660d7a76423ad2a72e...
process: ssk3_b5 seedcorn 4.exe: MD5 Hash: f4b517e9b17959362fd...
process: ssk.exe: MD5 Hash: 75898c82b619c093c8d...
process: ssk.exe: MD5 Hash: 999aaec5e253c895a7d...
process: ssk.exe: MD5 Hash: c6f3bd515904b2d06c9...
process: bk.exe: MD5 Hash: 8ea17d870bfeb5bef66...
process: bk.exe: MD5 Hash: 9a940b29791da893931...
                  ** UPDATE THE JURY STILL OUT ON THIS**
This is for Windows XP


FIRST:
Please unzip Pocket KillBox
to its own folder. Leave it where you can find it for now.

THEN:
Please Download the attached KillSSK.reg and save it to your Desktop.

NEXT:
DoubleClick on the KillSSK.reg and follow the prompts to allow the entries to merge into the registry.

NOW:
Please open Pocket KillBox.

Next, you will be entering the following SSK files into Pocket KillBox.
Please select the “Delete on Reboot” Option. Enter or Copy&Paste each of the following into the
box one by one, making sure Delete on Reboot is Checked for each entry. Click the Red X for
each entry, but DO NOT Allow your machine to be Rebooted until the last item has been entered:
** Note: For the .dlls, check the Unregister .dll Before Deleting box
as well.

C:\Program Files\SurfSideKick\Ssk.exe
C:\Program Files\SurfSideKick 2\Ssk.exe
C:\Program Files\SurfSideKick 3\Ssk.exe

C:\Program Files\SurfSideKick\SskBho.dll
C:\Program Files\SurfSideKick 2\SskBho.dll
C:\Program Files\SurfSideKick 3\SskBho.dll

C:\Program Files\SurfSideKick\SskCore.dll
C:\Program Files\SurfSideKick 2\SskCore.dll
C:\Program Files\SurfSideKick 3\SskCore.dll

C:\Windows\TEMP\sskupdater3.exe
C:\Windows\TEMP\SSK_B5.EXE

C:\WINDOWS\system32\repairs.dll

C:\Program Files\SurfSideKick
C:\Program Files\SurfSideKick 2
C:\Program Files\SurfSideKick 3


When the last item has been entered and you are prompted to reboot,
ALLOW Pocket KillBox to Reboot your computer. If Killbox fails to Reboot your machine,
do it manually.


NEXT:
Run CCleaner and Spybot S&D  and have Spybot fix what it finds.


Reboot to Normal Windows.......
 

 

COMPUTER SECURITY SYSTEMS ALL RIGHTS RESERVE 2005 official budu.com linkback partner
Acceptance Mark

contact me stevenoonan214@hotmail.com