Pages - Menu

Katrox's Blog | Computer Articles | Knowledge Articles

Monday, May 26, 2008

New Virus Attack : (MS Word Icon) SVCHOST SPOOLSV

Discovered a new virus that resides in c:\Recycled
  • CTFMON.exe
  • SMSS.exe
  • SPOOLSV.exe
  • SVCHOST.exe
The icon of these files are EXCTLY like Microsoft Windows MS Word type


Virus File Name:
ssvichosst.exe (having a folder icon)
(a file inside a folder having the same name as the folder, having folder icon)
You are unable to open TaskManager, Regedit, CMD, Msconfig, etc.
Some windows open for fractions of seconds and suddenly gets closed. Like TaskManager, Regedit, etc.
No command works in ’command’ window, except ‘exit’.
The Tools>FolderOptions is gone in the Windows Explorer.
You cannot see your hidden files.
Your system has become too slow. As the virus process takes up almost half of the resources.

Funny UST Scandal.avi.exe Virus


Name :Funny UST Scandal.avi.exe
Name :SMSS.exe
Icon :Video file (GOM Player)
Type of File :Application
Size :224KB/240KB
Modified :November 20, 2007
Attibutes :Hidden, System (varies)
File Version :
Description :
Copyright :
CompiledScript :AutoIt v3 Script : 3, 2, 8, 1

Tuesday, February 26, 2008


A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. However, the term "virus" is commonly used, albeit erroneously, to refer to many different types of malware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm can spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a file that appears harmless until executed.