<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-26464683</id><updated>2024-09-02T16:18:31.061+07:00</updated><title type='text'>++Virus Guardian++</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://virusguardian.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26464683/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://virusguardian.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>suckers929</name><uri>http://www.blogger.com/profile/17060537280267550987</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>5</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-26464683.post-116178920850575043</id><published>2006-10-25T22:12:00.000+07:00</published><updated>2006-10-26T19:27:14.760+07:00</updated><title type='text'>Free Anti Virus For Home User And Non Commercial Use</title><content type='html'>&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;strong&gt;1. Free Avast! 4 Home Edition&lt;/strong&gt;&lt;br/&gt;&lt;div&gt;&lt;img src=&quot;file:///C:/CAFE/TEMP/moz-screenshot.jpg&quot; alt=&quot;&quot; /&gt;&lt;font&gt;Free Avast!&lt;font&gt; 4 Home Edition is a full featured anti virus package designed exclusively for home user and non-commercial use.&lt;br/&gt;This free virus scanner protects against viruses, worms and Trojans on disk, CDs, in E-mail and during browsing.&lt;br/&gt;Incremental updates of virus database (twice a week) are small, fast and reliable&lt;br/&gt;Avast company offers the Home Edition free of charge, since, in our opinion, it is possible to avoid global virus spreading by efficient prevention; however, many users are not able to or do not want to pay for antivirus software.&lt;br/&gt;&lt;br/&gt;&lt;font&gt;Download&lt;br/&gt;&lt;a href=&quot;http://files.avast.com/iavs4pro/setupeng.exe&quot;&gt;&lt;img src=&quot;http://avast.com/eng/images/download_img.gif&quot; /&gt; &lt;/a&gt;&lt;a href=&quot;http://files.avast.com/iavs4pro/setupeng.exe&quot;&gt;&lt;font&gt;Avast!&lt;font&gt; 4 Home English Version&lt;a a=&quot;&quot; a=&quot;&quot; a=&quot;&quot; a=&quot;&quot; a=&quot;&quot; font=&quot;&quot;&gt;&lt;br/&gt;&lt;br/&gt;&lt;/a&gt;&lt;a href=&quot;http://files.avast.com/iavs4pro/setupger.exe&quot;&gt;&lt;img src=&quot;http://avast.com/eng/images/download_img.gif&quot; /&gt;&lt;/a&gt; &lt;font&gt;&lt;a href=&quot;http://files.avast.com/iavs4pro/setupeng.exe&quot;&gt;&lt;font&gt;Avast!&lt;font&gt; 4 Home German &lt;a a=&quot;&quot; a=&quot;&quot; a=&quot;&quot; a=&quot;&quot; a=&quot;&quot; a=&quot;&quot; href=&quot;http://not-a-real-namespace/http://not-a-real-namespace/http://not-a-real-namespace/http://files.avast.com/iavs4pro/setupeng.exe&quot;&gt;&lt;font&gt;&lt;/a&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;a href=&quot;http://files.avast.com/iavs4pro/setupeng.exe&quot;&gt;&lt;font&gt;Version&lt;br/&gt;&lt;/a&gt;&lt;a a=&quot;&quot; br=&quot;&quot;&gt;&lt;font&gt;&lt;br/&gt;&lt;/a&gt;&lt;a href=&quot;http://files.avast.com/iavs4pro/setupmal.exe&quot;&gt;&lt;img src=&quot;http://avast.com/eng/images/download_img.gif&quot; /&gt;&lt;/a&gt; &lt;font&gt;&lt;a href=&quot;http://files.avast.com/iavs4pro/setupeng.exe&quot;&gt;&lt;font&gt;Avast!&lt;font&gt; 4 Home Malay &lt;a a=&quot;&quot; a=&quot;&quot; a=&quot;&quot; a=&quot;&quot; a=&quot;&quot; a=&quot;&quot; href=&quot;http://not-a-real-namespace/http://not-a-real-namespace/http://not-a-real-namespace/http://files.avast.com/iavs4pro/setupeng.exe&quot;&gt;&lt;font&gt;&lt;/a&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;a href=&quot;http://files.avast.com/iavs4pro/setupeng.exe&quot;&gt;&lt;font&gt;Version&lt;br/&gt;&lt;/a&gt;&lt;a a=&quot;&quot; br=&quot;&quot;&gt;&lt;br/&gt;The user should fill the registration form to obtain the license key by &lt;font&gt;mail.&lt;br/&gt;&lt;/a&gt;&lt;a href=&quot;http://avast.com/i_kat_207.php?lang=ENG#register-form&quot;&gt;Click here for Registration of avast! 4 Home Edition&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;font&gt;&lt;font&gt;&lt;strong&gt;2.AVG Anti-Virus Free and AVG Anti-Spyware Free&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;AVG Anti-Virus Free Edition is a free anti-virus protection tool developed by GRISOFT for home use. We invite you to join the millions of satisfied customers worldwide who have downloaded the software and now enjoy the benefits of AVG Anti-Virus Free.&lt;br/&gt;GRISOFT is announcing a new version of the AVG Anti-Virus Free Edition. This new 7.5 version with improved performance and user interface is available. Users that are using AVG Free 7.1 will be provided with a specific dialog, within the next few weeks, with the opportunity to choose the right option fulfilling their needs. AVG Free 7.1 version will be discontinued on 15th of Jan 2007.&lt;br/&gt;&lt;br/&gt;Download &lt;br/&gt;&lt;span br=&quot;&quot;&gt;&lt;a href=&quot;http://free.grisoft.com/doc/5390/lng/us/tpl/v5#avg-anti-virus-free&quot;&gt;&lt;img src=&quot;http://free.grisoft.com/images/btn-download-free-version.gif&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/&gt;&lt;font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;br/&gt;&lt;br/&gt;</content><link rel='replies' type='application/atom+xml' href='http://virusguardian.blogspot.com/feeds/116178920850575043/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/26464683/116178920850575043' title='19 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26464683/posts/default/116178920850575043'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26464683/posts/default/116178920850575043'/><link rel='alternate' type='text/html' href='http://virusguardian.blogspot.com/2006/10/free-anti-virus-for-home-user-and-non.html' title='Free Anti Virus For Home User And Non Commercial Use'/><author><name>suckers929</name><uri>http://www.blogger.com/profile/17060537280267550987</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>19</thr:total></entry><entry><id>tag:blogger.com,1999:blog-26464683.post-114660452094292383</id><published>2006-05-03T04:12:00.000+07:00</published><updated>2006-10-26T19:32:19.540+07:00</updated><title type='text'>What is Malware?</title><content type='html'>What is malware?&lt;br /&gt;&lt;br /&gt;Malware (short for malicious software) comes in a vast array of different forms, each of which is designed specifically to damage or disrupt the infected machine or other networked machines. From redirecting your search attempts, to serving up pop-up ads, tracking the websites you visit, or deleting your important documents, malware can sit quietly on your computer without you ever even noticing, or it can slow down, disrupt or even periodically reboot your system. It will often to hide deep inside your system making removing it all the more difficult and may even reinstall itself even after you thought you had deleted it!&lt;br /&gt;&lt;br /&gt;This directory has been compiled with the purpose of arming you - the infected user - with the facts and the information you will need on your quest to rid your system of malicious software. For the purpose of this directory, we have broken down the generic &#39;malware&#39; into the following basic categories: worms, Trojans, viruses and other miscellaneous malware.</content><link rel='replies' type='application/atom+xml' href='http://virusguardian.blogspot.com/feeds/114660452094292383/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/26464683/114660452094292383' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26464683/posts/default/114660452094292383'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26464683/posts/default/114660452094292383'/><link rel='alternate' type='text/html' href='http://virusguardian.blogspot.com/2006/05/what-is-malware.html' title='What is Malware?'/><author><name>suckers929</name><uri>http://www.blogger.com/profile/17060537280267550987</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-26464683.post-114587151195869390</id><published>2006-04-24T16:34:00.000+07:00</published><updated>2006-10-26T19:37:28.786+07:00</updated><title type='text'>Viruses History</title><content type='html'>A program called &quot;Elk Cloner&quot; is credited with being the first computer virus to appear &quot;in the wild&quot; -- that is, outside the single computer or lab where it was created. Written in 1982 by Rich Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread by floppy disk.&lt;br /&gt;&lt;br /&gt;The first PC virus was a boot sector virus called (c)Brain, created in 1986 by two brothers, Basit and Amjad Farooq Alvi, operating out of Lahore, Pakistan. The brothers reportedly created the virus to deter pirated copies of software they had written.[2] However, analysts have claimed that the Ashar virus, a variant of Brain, possibly predated it based on code within the virus.&lt;br /&gt;&lt;br /&gt;Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of personal computers, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk.&lt;br /&gt;&lt;br /&gt;As bulletin board systems and online software exchange became popular in the late 1980s and early 1990s, more viruses were written to infect popularly traded software. Shareware and bootleg software were equally common vectors for viruses on BBSes. Within the &quot;pirate scene&quot; of hobbyists trading illicit copies of commercial software, traders in a hurry to obtain the latest applications and games were easy targets for viruses.&lt;br /&gt;&lt;br /&gt;Since the mid-1990s, macro viruses have become common. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel. These viruses spread in [Microsoft Office] by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most of these viruses were able to spread on Macintosh computers as well. Numerically, most of these viruses did not have the ability to send infected e-mail. The ones that did usually worked by accessing the Microsoft Outlook COM interface.&lt;br /&gt;&lt;br /&gt;Macro viruses pose unique problems for detection software. Here are two examples. First, some versions of Word caused macros to replicate themselves with additional blank lines. The virus behaved identically but would be misidentified as a new virus. Second, if two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a &quot;mating&quot; of the two and would likely be detected as a virus unique from the &quot;parents.&quot; [3]&lt;br /&gt;&lt;br /&gt;A computer virus may also be transmitted through instant messaging. A virus may send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source), goes to the website, the virus hosted at the site may be able to infect this new computer and continue propagating.</content><link rel='replies' type='application/atom+xml' href='http://virusguardian.blogspot.com/feeds/114587151195869390/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/26464683/114587151195869390' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26464683/posts/default/114587151195869390'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26464683/posts/default/114587151195869390'/><link rel='alternate' type='text/html' href='http://virusguardian.blogspot.com/2006/04/viruses-history.html' title='Viruses History'/><author><name>suckers929</name><uri>http://www.blogger.com/profile/17060537280267550987</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-26464683.post-114563753685481479</id><published>2006-04-21T23:36:00.000+07:00</published><updated>2006-04-21T23:39:55.116+07:00</updated><title type='text'>Virus Definition</title><content type='html'>&lt;blockquote&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;/blockquote&gt;A virus is a type of program that can replicate itself by making (possibly modified) copies of itself. The main criterion for classifying a piece of executable code as a virus is that it spreads itself by means of &#39;hosts&#39;. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with worms. A worm, however, can spread itself to other computers without needing to be transferred as part of a host. Many personal computers are now connected to the Internet and to local-area networks, facilitating their spread. Today&#39;s viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms.&lt;br /&gt;&lt;br /&gt;Viruses can infect different types of hosts. The most common targets are executable files that contain application software or parts of the operating system. Viruses have also infected the executable boot sectors of floppy disks, script files of application programs, and documents that can contain macro scripts. Additionally, viruses can infect files in other ways than simply inserting a copy of their code into the code of the host program. For example, a virus can overwrite its host with the virus code, or it can use a trick to ensure that the virus program is executed when the user wants to execute the (unmodified) host program. Viruses have existed for many different operating systems, including MS-DOS, AmigaOS, Linux and even Mac OS; however, the vast majority of viruses affect Microsoft Windows.&lt;br /&gt;&lt;br /&gt;A legitimate application program that can copy itself as a side effect of its normal function (e.g. backup software) is not considered a virus. Some programs that were apparently intended as viruses cannot self-replicate, because the infection routine contains bugs. For example, a buggy virus can insert copies of itself into host programs, but these copies never get executed and are thus unable to spread the virus. As long as at least some of the copies are able to make copies of themselves, they are still considered viruses, otherwise they are referred to as intended viruses.&lt;br /&gt;&lt;br /&gt;Some people incorrectly argue that malware is only classified as a virus if it both meets the above definition and can infect a computer without user activation. By this definition, malware that requires user activation to run would be classified as a trojan or a worm. But, before computers were networked together, the only way a virus would activate(excluding boot sector viruses) was by user activation, so this never was part of the definition of a virus.</content><link rel='replies' type='application/atom+xml' href='http://virusguardian.blogspot.com/feeds/114563753685481479/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/26464683/114563753685481479' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26464683/posts/default/114563753685481479'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26464683/posts/default/114563753685481479'/><link rel='alternate' type='text/html' href='http://virusguardian.blogspot.com/2006/04/virus-definition.html' title='Virus Definition'/><author><name>suckers929</name><uri>http://www.blogger.com/profile/17060537280267550987</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-26464683.post-114543774499778201</id><published>2006-04-19T15:39:00.000+07:00</published><updated>2006-04-23T00:22:21.033+07:00</updated><title type='text'>Virus Brontok</title><content type='html'>&lt;h2 style=&quot;border: 1px solid rgb(175, 163, 191); margin: 0pt; background-color: rgb(221, 206, 242); font-family: sans-serif; font-size: 120%; font-weight: bold; text-align: left; color: rgb(0, 0, 0); padding-left: 0.4em; padding-top: 0.2em; padding-bottom: 0.2em;&quot;&gt;Brontok Virus Analysis&lt;/h2&gt;&lt;br /&gt;&lt;b style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;b style=&quot;color: rgb(0, 0, 0);&quot;&gt;Name&lt;/b&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;              :      &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;-W32/Brontok-J&lt;/span&gt;&lt;br /&gt;&lt;b style=&quot;color: rgb(0, 0, 0);&quot;&gt;Type&lt;/b&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;              :      &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;-Worm&lt;/span&gt;&lt;br /&gt;&lt;b style=&quot;color: rgb(0, 0, 0);&quot;&gt;How it spreads&lt;/b&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;  :      &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;-Email messages&lt;/span&gt;&lt;br /&gt;&lt;b style=&quot;color: rgb(0, 0, 0);&quot;&gt;Affected operating&lt;/b&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;:      &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;-systemsWindows&lt;/span&gt;&lt;br /&gt;&lt;b style=&quot;color: rgb(0, 0, 0);&quot;&gt;Side effects&lt;/b&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;      :     &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;-Sends itself to email addresses found on the infected computer&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;-Modifies data on the computer&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;-Installs itself in the Registry&lt;/span&gt;&lt;br /&gt;&lt;b style=&quot;color: rgb(0, 0, 0);&quot;&gt;Aliases&lt;/b&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;           :&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;-W32.Rontokbro@mm&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;-Email-Worm.Win32.Brontok.c&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;/span&gt;&lt;a style=&quot;color: rgb(0, 0, 0);&quot; href=&quot;http://www.sophos.com/downloads/ide/bronto-j.ide&quot;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2 style=&quot;border: 1px solid rgb(175, 163, 191); margin: 0pt; background-color: rgb(221, 206, 242); font-family: sans-serif; font-size: 120%; font-weight: bold; text-align: left; color: rgb(0, 0, 0); padding-left: 0.4em; padding-top: 0.2em; padding-bottom: 0.2em;&quot;&gt;Virus Description&lt;/h2&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;W32/Brontok-J is an email worm for the Windows platform.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;W32/Brontok-J attempts to send itself to email addresses harvested from the computer. It will also attempt to modify various Windows Explorer settings.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;W32/Brontok-J will restart the computer if it finds a window title containing certain strings such as &quot;.EXE&quot;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2 style=&quot;border: 1px solid rgb(175, 163, 191); margin: 0pt; background-color: rgb(221, 206, 242); font-family: sans-serif; font-size: 120%; font-weight: bold; text-align: left; color: rgb(0, 0, 0); padding-left: 0.4em; padding-top: 0.2em; padding-bottom: 0.2em;&quot;&gt;Advanced&lt;/h2&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;This section is for technical experts who want to know more.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;W32/Brontok-J is a email worm for the Windows platform.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;W32/Brontok-J attempts to send itself to email addresses harvested from the computer. It will also attempt to modify various Windows Explorer settings.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;W32/Brontok-J will restart the computer if it finds a window title containing certain strings such as &quot;.EXE&quot;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;When first run W32/Brontok-J copies itself to:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;/span&gt;&lt;blockquote&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&amp;ltUser&gt;\Local Settings\Application Data\br4941on.exe&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&amp;ltUser&gt;\Local Settings\Application Data\csrss.exe&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&amp;ltUser&gt;\Local Settings\Application Data\inetinfo.exe&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&amp;ltUser&gt;\Local Settings\Application Data\lsass.exe&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&amp;ltUser&gt;\Local Settings\Application Data\services.exe&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&amp;ltUser&gt;\Local Settings\Application Data\smss.exe&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&amp;ltUser&gt;\Local Settings\Application Data\svchost.exe&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&amp;ltUser&gt;\Start Menu\Startup\Empty.pif&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&amp;ltWindows&gt;\KesenjanganSosial.exe&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&amp;ltWindows&gt;\ShellNew\RakyatKelaparan.exe&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&amp;ltSystem&gt;\cmd-brontok.exe&lt;/span&gt;&lt;/blockquote&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;W32/Brontok-J will drop various files in My Docuement\My Pictures folder with message from the virus writer.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;The following registry entries are created to run br4941on.exe and RakyatKelaparan.exe on startup:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;/span&gt;&lt;blockquote&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Run&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;Tok-Cirrhatus-1959&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&amp;ltUser&gt;\Local Settings\Application Data\br4941on.exe&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;Bron-Spizaetus&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&amp;ltWindows&gt;\ShellNew\RakyatKelaparan.exe&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;The following registry entry is changed to run KesenjanganSosial.exe on startup:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;Shell&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;Explorer.exe &quot;&amp;ltWindows&gt;\KesenjanganSosial.exe&quot;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;(the default value for this registry entry is &quot;Explorer.exe&quot; which causes the Microsoft file &amp;ltWindows&gt;\Explorer.exe to be run on startup).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;The following registry entry is set, disabling the registry editor (regedit):&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;DisableRegistryTools&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;1&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;Registry entries are set as follows:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;NoFolderOptions&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;1&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;DisableCMD&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;0&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;Hidden&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;0&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;HideFileExt&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;1&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;ShowSuperHidden&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;0&lt;/span&gt;&lt;/blockquote&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2 style=&quot;border: 1px solid rgb(175, 163, 191); margin: 0pt; background-color: rgb(221, 206, 242); font-family: sans-serif; font-size: 120%; font-weight: bold; text-align: left; color: rgb(0, 0, 0); padding-left: 0.4em; padding-top: 0.2em; padding-bottom: 0.2em;&quot;&gt;Brontok Anti Virus&lt;/h2&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;- &lt;/span&gt;&lt;a style=&quot;color: rgb(51, 102, 255);&quot; href=&quot;http://www.softpedia.com/get/Antivirus/Brontok-Washer.shtml&quot;&gt;Brontok Washer 1.5&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(51, 102, 255);&quot;&gt;- &lt;/span&gt;&lt;a style=&quot;color: rgb(51, 102, 255);&quot; href=&quot;http://free.grisoft.com/softw/70free/setup/avg71free_385a729.exe&quot;&gt;Latest Version Of AVG Free&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(51, 102, 255);&quot;&gt;-&lt;span style=&quot;color: rgb(51, 0, 51);&quot;&gt;Use Sophos&lt;/span&gt; &lt;/span&gt;&lt;a style=&quot;color: rgb(51, 102, 255);&quot; href=&quot;http://www.sophos.com/downloads/ide/bronto-j.ide&quot;&gt;Download virus identity (IDE) file From Shophos&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://virusguardian.blogspot.com/feeds/114543774499778201/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/26464683/114543774499778201' title='40 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/26464683/posts/default/114543774499778201'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/26464683/posts/default/114543774499778201'/><link rel='alternate' type='text/html' href='http://virusguardian.blogspot.com/2006/04/virus-brontok.html' title='Virus Brontok'/><author><name>suckers929</name><uri>http://www.blogger.com/profile/17060537280267550987</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>40</thr:total></entry></feed>