|
|
|
Onafhankelijk medium voor liefhebbers en verzamelaars van oude radio“s en gerelateerde zaken (zoals oude TV“s, versterkers, meetapparatuur). Hier kunt u discussiėren en chatten over uw hobby. Voorbeelden zijn: identificatie of datering van oude toestellen, vragen over documentatie, hulp bij reparaties en restauraties. De voertaal op dit forum is Nederlands, maar bijdragen in andere talen zijn ook welkom. |
Removal
Geschreven door Daniel Geelhoed om 27. Nov 2001 15:06:01:
In reactie op: VIRUS!!!! OPEN GEEN MAIL VAN PAUL WELTHER geschreven door RAMON POOL om 27. Nov 2001 09:06:53:
Hallo, Ik kreeg ze van allebei zelfs! Heb niets geopend en geen infectie gehad, maar ik zag ergens nog een text en een link staan voor info + verwijdering
http://www.claymania.com/badtrans-removal.html
Daniel
Description - What virus is this?
A new variant of Badtrans has been discovered, referred to as Badtrans.b. AVERT has raised the Risk Assessment on this variant of W32/Badtrans@MM to High Risk for Consumers. We have received many reports from the home users that they have become infected. It is believed that failure to update recently has caused this increase in occurrence.
VirusScan and other McAfee products with DAT files 4172 and higher are protected from this variant.W32/Badtrans@MM is a mass-mailing worm that drops a remote-access Trojan. The virus arrives via email in Microsoft Outlook and attempts to send itself by replying to unread email messages. The email may contain the text "Take a look to the attachment" in the message body and will contain an attachment that is 13,312 bytes in length. The attachment name is created from three sections.
The first part is chosen from the possibilities:
fun
Humor
docs
info
Sorry_about_yesterday
Me_nude
Card
SETUP
stuff
YOU_are_FAT!
HAMSTER
news_doc
New_Napster_Site README
images
Pics
The second part is chosen from the possibilities:.DOC.
.MP3.
.ZIP.and the last part from the possibilities:
pif
scrThis new variant also uses the iframe exploit and incorrect MIME header to run automatically on unpatched systems. See Microsoft Security Bulletin (MS01-020) for more information and a patch.