
Goto regedit
by Start-> Run-> regedit
goto->HKEY_CURRENT_USER->Software->microsoft->Windows->Currentversion->Policies->explorer
create a new dword value as NoTrayItemsDisplay and set it to 1

Type of threat.
Additional type information.
Date that AVERT discovered this threat.
File size, in bytes, of the threat.
McAfee DAT files contain detection and repair information for threats. The Minimum DAT field specifies the lowest/oldest DAT version that is capable of detecting the first incarnation of a threat, and the release date. The highest/newest DAT version should always be used for the most complete protection and are available on the Anti-Virus Updates page.
Each description displays the minimum, fully tested, DAT version that includes regular detection for a particular threat. These fully tested DATs are released on a daily basis. If necessary, they are also released when a Medium, Medium On Watch, or High risk threat is discovered. An EXTRA.DAT will also be posted for these more prevalent threats, if necessary.
For each description listed, detection is always available. In the event that the DAT version specified is not yet available, an EXTRA.DAT file may be downloaded via the McAfee AVERT Extra.dat Request Page. Alternatively, minimally tested HOURLY BETA DAT files are available for downloading.
McAfee DAT files are constantly being updated to enhance detection capabilities. The Updated DAT field specifies the released DAT version that contains the most up to date detection.
The scan engine uses the DAT files to detect threats. The Minimum Engine field specifies the lowest/oldest engine version that is capable of detecting this threat. The highest/newest engine version should always be used for the most complete protection and are available on the Anti-Virus Updates page.
Date/time this description was published using Pacific Time.
Date/time this description was last modified using Pacific Time.
This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.
-- Update May 18, 2005 --
This is a generic detection for over 100 variants of Mytob. As the virus authors modify their source code and release new variants, some of them will be detected. However some variants are likely to be missed. As such the generic detection routines are likely to be modified regularly to provide more detection for these threats.
-- Update April 13, 2005 --
The Mytob author(s) have been very busy recently, releasing multiple variants a day. There are now some 96 different "versions" known to exists. Many of these are simply repackaged versions of the same binary, and most variants function in a similar fashion. The mailing routine remains much the same, while the bot functionality is evolving in-line with the Sdbot worm family. Newer variants include the FURootkit , contain an Instant Messenger worm component (detected as W32/Mytob.worm!im), and spread via LSASS and DCOM RPC vulnerabilities.
-- Update March 2 4, 2005 --
AVERT has received 3 new variants within an hour of this threat. The variants are use multiple forms of compression/encryption and detection will be added to the 4455 DAT files. Initial seeding of the files can be identified as follows, HOWEVER replicated samples can not be identified by file hash or size as the virus appends garbage to the end of the executable.
These new variants create a file named hellmsn.exe on the root of the C:\ drive (detected as W32/Generic.e with released DAT files).
--
This detection covers multiple variants of a mass-mailing worm that combines W32/Mydoom@MM functionality with W32/Sdbot.worm functionality. The following description serves as an example of some of the variants:
The virus arrives in an email message as follows:
From: (Spoofed email sender)
Do not assume that the sender address is an indication that the sender is infected. Additionally you may receive alert messages from a mail server that you are infected, which may not be the case.
Subject: (Varies, such as)
Body: (Varies, such as)
Attachment: (varies [.bat, .exe, .pif, .cmd, .scr] - often arrives in a ZIP archive)
In the case of two file extensions, multiple spaces may be inserted as well, for example:
When the attachment is run, the virus copies itself to the WINDOWS SYSTEM directory (typically c:\windows\system32) as wfdmgr.exe . Registry keys are created to load this file at startup:
Additional keys/values are created, which are typically associated with W32/Sdbot.worm:
The Sdbot functionality in the worm is designed to contact the IRC server named, irc.blackcarder.net , join a specified channel, and wait for further instructions. This bot can accept commands to download and execute other programs. The bot also contains code to spread via the LSASS exploit [ http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx ]
The mailing component harvests address from the local system. Files with the following extensions are targeted:
The worm avoids certain address, those using the following strings:
Additionally, the worm contains strings, which it uses to randomly generate, or guess, email addresses. These are prepended as user names to harvested domain names:
Finally the virus sends itself via SMTP - constructing messages using its own SMTP engine. The worm guesses the recipient email server, prepending the target domain name with the following strings:
All Users:
Use current engine and DAT files for detection and removal.
Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).
N/A
This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.
-- Update May 18, 2005 --
This is a generic detection for over 100 variants of Mytob. As the virus authors modify their source code and release new variants, some of them will be detected. However some variants are likely to be missed. As such the generic detection routines are likely to be modified regularly to provide more detection for these threats.
-- Update April 13, 2005 --
The Mytob author(s) have been very busy recently, releasing multiple variants a day. There are now some 96 different "versions" known to exists. Many of these are simply repackaged versions of the same binary, and most variants function in a similar fashion. The mailing routine remains much the same, while the bot functionality is evolving in-line with the Sdbot worm family. Newer variants include the FURootkit , contain an Instant Messenger worm component (detected as W32/Mytob.worm!im), and spread via LSASS and DCOM RPC vulnerabilities.
-- Update March 2 4, 2005 --
AVERT has received 3 new variants within an hour of this threat. The variants are use multiple forms of compression/encryption and detection will be added to the 4455 DAT files. Initial seeding of the files can be identified as follows, HOWEVER replicated samples can not be identified by file hash or size as the virus appends garbage to the end of the executable.
These new variants create a file named hellmsn.exe on the root of the C:\ drive (detected as W32/Generic.e with released DAT files).
--
This detection covers multiple variants of a mass-mailing worm that combines W32/Mydoom@MM functionality with W32/Sdbot.worm functionality. The following description serves as an example of some of the variants:
The virus arrives in an email message as follows:
From: (Spoofed email sender)
Do not assume that the sender address is an indication that the sender is infected. Additionally you may receive alert messages from a mail server that you are infected, which may not be the case.
Subject: (Varies, such as)
Body: (Varies, such as)
Attachment: (varies [.bat, .exe, .pif, .cmd, .scr] - often arrives in a ZIP archive)
In the case of two file extensions, multiple spaces may be inserted as well, for example:
When the attachment is run, the virus copies itself to the WINDOWS SYSTEM directory (typically c:\windows\system32) as wfdmgr.exe . Registry keys are created to load this file at startup:
Additional keys/values are created, which are typically associated with W32/Sdbot.worm:
The Sdbot functionality in the worm is designed to contact the IRC server named, irc.blackcarder.net , join a specified channel, and wait for further instructions. This bot can accept commands to download and execute other programs. The bot also contains code to spread via the LSASS exploit [ http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx ]
The mailing component harvests address from the local system. Files with the following extensions are targeted:
The worm avoids certain address, those using the following strings:
Additionally, the worm contains strings, which it uses to randomly generate, or guess, email addresses. These are prepended as user names to harvested domain names:
Finally the virus sends itself via SMTP - constructing messages using its own SMTP engine. The worm guesses the recipient email server, prepending the target domain name with the following strings:
All Users:
Use current engine and DAT files for detection and removal.
Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).
Microsoft has finally activated the most aggressive part of their Windows Genuine Advantage program -- active notifications.
After downloading the latest Windows updates, if your Windows cd-key doesn't validate against Microsoft's online database of cd-keys, you may be greeted with this unpleasant five-second mandatory delay dialog at the login page:
On top of that, you get a repeating balloon notification that nags you periodically while you use the operating system:
The warnings also get more dire as time progresses:
This copy of Windows is not genuine and you have not resolved the issue. This computer is no longer eligible to receive select security upgrades from Microsoft. To protect your computer, you must click Get Genuine now.
The language here is a little misleading. Microsoft is socially obligated to provide critical security updates to pirated machines. Otherwise those vulnerable machines will eventually be compromised and potentially used in denial of service attacks and other nefarious schemes. Microsoft does provide so-called "critical" updates to all Windows machines, regardless of whether or not they're genuine.
This is all courtesy of the mandatory "Windows Genuine Advantage Notification" service that is being delivered now through Windows Update. This isn't just a service you can disable, or a process you can kill in task manager, either. You'll have to install some kind of questionable third-party hack to get around it.
I suppose it's only malware if you're a pirate. What's a poor, beleaguered user to do? Microsoft offers five options:
Notice the word "Purchase" appears in three of those five options. There's almost no way to finagle a free cd-key out of this.
What is the SMASH Virus?
This virus launches on the 14th day of the month. As of July 13th, 2000 it has not been found in the wild so the threat is very low. However, the presentation of the virus and the level of destruction warrants discussing the virus. When the current system day is 14 and the month is greater than or equal to 6 (June), the virus activates.
The next time the computer starts, the system displays a Windows Blue Screen, commonly referred to as the Blue Screen of Death (BSOD).
This screen contains the following message and hangs the system:
"Virus Warning!Virus name is 'SMASH', project D version 0x0A.Created and compiled by Domitor.Seems like your bad dream comes true..."
The virus uses low-level system calls that are made directly to BIOS memory to activate it.
What damage does the Virus cause?
After the blue screen is displayed, the computer freezes.
The SMASH virus preys upon human reactions to activate the virus. The malicious code will only activate once the computer is rebooted after freezing. Since most computer users would press any key or try to reboot the computer after receiving the blue screen, they unwittingly cause the virus to activate.
Since the virus overwrites part of the IO.SYS file, the system hangs upon a reboot and displays the message "Formatting hard disk". It then formats the hard drive destroying all data.
How to Avoid the SMASH Virus
Since the virus is nearly impossible to stop once it has been activated, the only precautions one can take are to update their virus signatures and scan their system regularly.
Although it hasn't been seen in the wild and is a low risk virus, the possiblity of a virus attacking a computer in this way has now been proven. So, most likely there will be more viruses of this type in the future.
Cleaning the USB Drive infected with heap41a virus
1. Before inserting the USB Drive please disable autorun to prevent the virus from infecting your computer again.
How to Disable USB Drive to autorun (Windows XP):
a. Open Windows Explorer or press the Windows + “e” key.
b. Right-click the drive of the USB Drive. Then select Properties. Drive Properties will appear.
c. Select the AutoPlay tab.
d. Choose Select an Action to Performe. At the bottom of the selection, click Take no Action, then click Apply.
f. Click OK to exit Drive Properties
Windows XP SP2 added the security center to monitor firewall, automatic updates, and antivirus settings and to warn users when there is a problem.
This is a good idea for the most part, since it gives a visual warning to the user when their antivirus or firewall have been disabled or changed.
However, what if your computer doesnt connect to the internet often enough to update your antivirus, or if you have purposely turned off the Automatic Updates feature.
Maybe you dont want Windows to warn you each time you restart your computer or modify something.
I have had several instances where the Windows XP SP2 Security Alert balloons were more of a nuisance than anything else.
Description
internet.exe is a process which is registered as the W32.Mytob.LM@mm Worm. This virus is distributed via the Internet through e-mail and comes in the form of an e-mail message, in the hopes that you open its hostile attachment. The worm has its own SMTP engine which means it gathers E-mails from your local computer and re-distributes itself. In worst cases this worm can allow attackers to access your computer, stealing passwords and personal data. This process is a security risk and should be removed from your system.
Disable and Remove internet.exe IMMEDIATELY. This process is most likely a virus or trojan.
Part of:
W32.Mytob.LM@mm
Common Path(s):%windir%\internet.exe
Windows XP Professional with a password set for the main administrator account.
when computer is on and it came up to the user login screen. They were presented with this SVCHOST.EXE error message. The only options the error message allows are to click OK to terminate the program or click Cancel to debug the program.
After asking several questions about what they did before turning the computer off, it became apparent that Windows Update had run before the computer was shut down.Interestingly enough, even starting the computer in Safe Mode produced the same error. While the event log in Windows XP indicates the faulting application is truly svchost.exe.
How to Repair this SVCHOST.EXE errorAfter some investigating into the 0X745f2780 SVCHOST error, it became apparent the problem is a corrupted Windows Update in Windows XP.
Follow the steps below to fix this error.Verify Windows Update Service Settings
Click on Start, Run and type the following command in the open box and click OKservices.msc
Find the Automatic Updates service and double-click on it.
Click on the Log On Tab and make sure the "Local System Account" is selected as the logon account and the box for "allow service to interact with desktop" is UNCHECKED.
Under the Hardware Profile section in the Log On Tab, make sure the service is enabled.
On the General Tab, the Startup Type should be Automatic, if not, drop the box down and select Automatic.
Under "Service Status" on the General tab, the service should be Started, click the Start button enable it.
Repeat the steps above for the service "Background Intelligent Transfer Service (BITS)" Re-Register Windows Update DLLs
Click on Start, Run, and type CMD and click ok
In the black command window type the following command and press EnterREGSVR32 WUAPI.DLL
Wait until you receive the "DllRegisterServer in WUAPI.DLL succeeded" message and click OK
Repeat the last two steps above for each of the following commands:REGSVR32 WUAUENG.DLLREGSVR32 WUAUENG1.DLLREGSVR32 ATL.DLLREGSVR32 WUCLTUI.DLLREGSVR32 WUPS.DLLREGSVR32 WUPS2.DLLREGSVR32 WUWEB.DLLRemove Corrupted Windows Update Files
At the command prompt, type the following command and press Enternet stop WuAuServ
Still at the command prompt, type cd %windir% and press Enter
In the opened folder, type the following command and press Enter to rename the SoftwareDistribution Folderren SoftwareDistribution SD_OLD
Restart the Windows Update Service by typing the following at the command promptnet start WuAuServ
type Exit and Press Enter to close the command prompt Reboot Windows
click on Start, Shut Down, and Restart to reboot Windows XP Although this method may not solve all of the issues with a SVCHOST.EXE Application error, I have found it fixed the problem with the 0x745f2780 reference error. Other Issues with SVCHOST.EXEI've encountered other issues with SVCHOST taking up 100% of the CPU Cycles. These issues are usually experienced with Windows Update in some form or another. To fix this frustrating problem, following these steps:
1) Download and install Update for Windows XP (KB927891)
2) Download and install an update for Windows Update Agent WSUS 3.0
3) Restart your computer and your computer should run better with slowing to a crawl because of SVCHOST.EXE
SendTo folder option on right click on a particular item
How to create Sendto option in right click option on an itemIf you own Windows ME, 2000, or XP, the absolute easiest way to access the SendTo folder for the current user logged in is to:Click Start -> Run.Type in "sendto" (no quotes) and press Enter.
An Explorer window will appear; simply drag and drop shortcut icons over and they will appear in the SendTo dialogue menu when you right-click an object.
For Windows 95 and 98, the SendTo folder location is located at C:\Windows\SendTo.Side note: not all objects (shortcut to programs) will work with SendTo.
Only objects that accept some sort of input (such as a shortcut to MS Word, notepad, a folder, or drive letter), will work.