J
Jeff B
Last week I posted a message about the following file: kx.dta
It was the output for a keylogger program. I'm running W98SE, and nothing
turned up with Norton 2003, Pest Patrol, or Fix-It virus scan.
I found an entry in my Startup (msconfig/startup) that was labeled msscv and
it used SVCHOST in the command line. I was not able to disable this item,
it kept re-checking itself. Likewise, I found the keys in the registry, and
any changes or deletions there simply resulted in a new key being created.
I was able to finally remove the registry items in Safe Mode, and the item
no longer appears in my startup list. The file kx.dta is no longer being
produced.
What I would really like to know is what trojan/keylogger produces the file
kx.dta. Can anyone anwer that? I'm reposting the question mostly because
last week the thread trailed off into a discussion of search capabilities
for various operating systems..... really, it did
The reason I want to know is that the computer belongs to a friend of mine,
and he uses it for his home business. As far as I know, someone else had
full access to his customers data and all of his account passwords...
anything that was typed. I have logs of the suspect IP addresses where the
file was being sent, but I think more info would be helpful before turning
this info over for possible prosecution.
Many thanks
Jeff B
It was the output for a keylogger program. I'm running W98SE, and nothing
turned up with Norton 2003, Pest Patrol, or Fix-It virus scan.
I found an entry in my Startup (msconfig/startup) that was labeled msscv and
it used SVCHOST in the command line. I was not able to disable this item,
it kept re-checking itself. Likewise, I found the keys in the registry, and
any changes or deletions there simply resulted in a new key being created.
I was able to finally remove the registry items in Safe Mode, and the item
no longer appears in my startup list. The file kx.dta is no longer being
produced.
What I would really like to know is what trojan/keylogger produces the file
kx.dta. Can anyone anwer that? I'm reposting the question mostly because
last week the thread trailed off into a discussion of search capabilities
for various operating systems..... really, it did
The reason I want to know is that the computer belongs to a friend of mine,
and he uses it for his home business. As far as I know, someone else had
full access to his customers data and all of his account passwords...
anything that was typed. I have logs of the suspect IP addresses where the
file was being sent, but I think more info would be helpful before turning
this info over for possible prosecution.
Many thanks
Jeff B