English
Internet threat level: 1

 Detected May 12 2004 12:42 GMT Released May 12 2004 12:42 GMT Published Mar 05 2007 06:58 GMT

Technical Details
Removal instructions

## Technical Details

This Trojan downloads other programs via the Internet without the knowledge or consent of the user and launches them on the victim machine. The program itself is a Windows PE EXE file. It is 36,352 bytes in size. It is written in Borland Delphi.

http://counter.****s.com/2/dk.exe

(At the moment of writing, this link was not working.)

If the file is successfully downloaded, it will be saved to the C: root directory as alpha.exe:

C:\alpha.exe

The file will then be launched for execution.

The Trojan also adds the following buttons to Internet Explorer:

by creating the following registry keys and parameters:

[HKLM\Software\Microsoft\Internet Explorer\Extensions\{FE5A1910-F121-11d2-BE9E-01C04A7936B1}]
"ButtonText"="SEARCH"
"HotIcon"="shell32.dll,5"
"Icon"="shell32.dll,4"
"CLSID"="{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}"
"Default Visible"="Yes"

[HKLM\Software\Microsoft\Internet Explorer\Extensions\{FE5A1910-F121-11d2-BE9E-01C04A7936B2}]
"ButtonText"="ENTERTAINMENT"
"HotIcon"="shell32.dll,12"
"Icon"="shell32.dll,13"
"CLSID"="{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}"
"Default Visible"="Yes"

[HKLM\Software\Microsoft\Internet Explorer\Extensions\{FE5A1910-F121-11d2-BE9E-01C04A7936B3}]
"ButtonText"="PILLS"
"HotIcon"="shell32.dll,181"
"Icon"="shell32.dll,180"
"CLSID"="{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}"
"Default Visible"="Yes"

[HKLM\Software\Microsoft\Internet Explorer\Extensions\{FE5A1910-F121-11d2-BE9E-01C04A7936B4}]
"ButtonText"="SECURITY"
"HotIcon"="shell32.dll,194"
"Icon"="shell32.dll,45"
"CLSID"="{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}"
"Default Visible"="Yes"

[HKLM\Software\Microsoft\Internet Explorer\Extensions\{FE5A1910-F121-11d2-BE9E-01C04A7936B5}]
"ButtonText"="SEARCH"
"HotIcon"="shell32.dll,157"
"Icon"="shell32.dll,155"
"CLSID"="{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}"
"Default Visible"="Yes"

The Trojan also creates the following registry keys which will act as redirects when Internet Explorer is used:

[HKLM\Software\Microsoft\Windows\CurrentVersion\URL\DefaultPrefix]

[HKLM\Software\Microsoft\Internet Explorer\Search]

[HKCU\Software\Microsoft\Internet Explorer\Main]

[HKCU\Software\Microsoft\Internet Explorer\SearchUrl]
"provider"=""

## Removal instructions

If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:

1. Use Task Manager to terminate the Trojan process.
2. Delete the original Trojan file (the location will depend on how the program originally penetrated the victim machine).
3. Delete the file called alpha.exe from the C: root directory:
C:\alpha.exe
4. Delete the following registry keys:

[HKLM\Software\Microsoft\Internet Explorer\Extensions\{FE5A1910-F121-11d2-BE9E-01C04A7936B1}]

[HKLM\Software\Microsoft\Internet Explorer\Extensions\{FE5A1910-F121-11d2-BE9E-01C04A7936B2}]

[HKLM\Software\Microsoft\Internet Explorer\Extensions\{FE5A1910-F121-11d2-BE9E-01C04A7936B3}]

[HKLM\Software\Microsoft\Internet Explorer\Extensions\{FE5A1910-F121-11d2-BE9E-01C04A7936B4}]

[HKLM\Software\Microsoft\Internet Explorer\Extensions\{FE5A1910-F121-11d2-BE9E-01C04A7936B5}]

5. Delete the following system registry key parameters:

[HKLM\Software\Microsoft\Windows\CurrentVersion\URL\DefaultPrefix]
"(default)"

[HKLM\Software\Microsoft\Internet Explorer\Search]
"CustomizeSearch"
"SearchAssistant"

[HKCU\Software\Microsoft\Internet Explorer\Main]
"Start Page"

[HKCU\Software\Microsoft\Internet Explorer\SearchUrl]
"provider"

6. Update your antivirus databases and perform a full scan of the computer (download a trial version of Kaspersky Anti-Virus).

Share

Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.

Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).

This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.

Other versions

Aliases