{"title":"TROJ_SMALL.SV","categories":["\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3"],"height":"190","type":"rich","blog_url":"https://diary.palm84.com/","width":"100%","provider_name":"Hatena Blog","provider_url":"https://hatena.blog","url":"https://diary.palm84.com/entry/20050201/p3","published":"2005-02-01 00:00:05","description":"CoolWebSearch\u7cfb\u306e\u30a4\u30f3\u30b9\u30c8\u30fc\u30e9\u30fc\u306e\u691c\u51fa\u540d\u306e\u3088\u3046\u3067\u3059\u3002\u4f46\u3057\u3001\u5168\u304f\u306e\u65b0\u7a2e\u3067\u306f\u306a\u3044\u3068\u601d\u3044\u307e\u3059\u3002 Upon execution, this memory-resident Trojan verifies if affected machines have Internet access. If it finds Internet access, it donwloads certain files, which TREND MICRO detects as the following malware programs, from various locations: BKDR_JEEMP.\u2026","blog_title":"Palm84 \u67d0\u6240\u306e\u65e5\u8a18","author_name":"palm84","version":"1.0","author_url":"https://blog.hatena.ne.jp/palm84/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fdiary.palm84.com%2Fentry%2F20050201%2Fp3\" title=\"TROJ_SMALL.SV - Palm84 \u67d0\u6240\u306e\u65e5\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","image_url":null}