Hi uniquename,
I done some investigation on this versatile malware, and found these alterations to the registry, that play a part there: found this online:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\KIMS\DSR]
“InstallDir”=“C:\Documents and Settings\Hell*******\K^MS”
“Version”=“v2.0dev”
“DoneOption”=“Notify”
ustedes van a tener que editar las \ de la ruta (momentaneamente
la proxima version funcionara diferente) y les quedaria asi:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\KIMS\DSR]
“InstallDir”=“C:\Documents and Settings\Hell\********\KMS”
“Version”=“v2.0dev”
“DoneOption”=“Notify”
They use the antivirus modification tool that makes sure the virus goes under the radar of: A-squared, Avast, AVG, Avira, Bitdefender, ClamWin, DrWeb, ETrust, F-Prot, Ikarus, KAV, McAfee, Nod32v2, Norman, Panda, PC-Cilin, QuickHeal, Solo, Sophos, VBA 32, VirusBuster, they check it against three heuristic signatures, a specific, a base one, and in between a medium one, and then they can change the virus so that it is not longer detected by mentioned av-products. The scanner does not alert, the users is not alerted and thinks he is protected, all parties are happy, new dangerous developments, read what this Prevx spokesman has to say about this development:
http://www.prevx.com/blog/117/March---bad-month-in-the-office-for-PC-security-vendors-and-users.html
polonus