Kaspersky Labs has released a special utility. In connection with the numerous instances of infection caused by the latest modification of the Internet worm
Hi,The body of an infected message is empty or contains a random text. The malicious program is launched automatically when an e-mail is viewed. In order to accomplish this, the worm uses a security breach in Internet Explorer safety features that was discovered nearly a year ago in March 2001. Following start-up, Klez.e installs itself into a Windows system file with a random name beginning with 'Wink,' for example, 'Winkad.exe.' The worm searches for links to EXE files in the following registry key: Software\Microsoft\Windows\CurrentVersion\App Paths, and attempts to infect any found applications. Klez.e also infects RAR archives by writing its copies here with a random name, and on the 6th of odd months (January, March etc.), it searches for all files on an infected computer and fills them with random contents. These files cannot be recovered and must be restored from a back-up copy. In addition to this the worm attempts to halt the operation of well-known anti-virus programs by forcibly closing their executable files within a computer's active processes. Defense procedures thwarting Klez.e have were added to the Kaspersky Anti-Virus database more than two weeks ago. A free utility for detecting and deleting Klez can be downloaded here. We also recommend temporarily not using the preview function in e-mail programs.
Hello,
Re:
Fw:
how are you
let's be friends
darling
don't drink too much
your password
honey
some questions
please try again
welcome to my hometown
the Garden of Eden
introduction on ADSL
meeting notice
questionnaire
congratulations
sos!
japanese girl VS playboy
look,my beautiful girl friend
eager to see you
spice girls' vocal concert
Japanese lass' sexy pictures