From: "Roque Caporale" <[EMAIL PROTECTED]>
-----------------------------------------------------------------------------

content=multipart/related
type="multipart/alternative"
boundary="----=_NextPart_000_0287_01C1EC50.8EF3B680"

This is a multi-part message in MIME format.

------=_NextPart_000_0287_01C1EC50.8EF3B680
Content-Type: multipart/alternative;
        boundary="----=_NextPart_001_0288_01C1EC50.8EF3B680"


------=_NextPart_001_0288_01C1EC50.8EF3B680
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable


Type: Hoax=20




This is a hoax that, like the SULFNBK.EXE Warning hoax, tries to =
persuade you to delete a legitimate Windows file from your computer. The =
file that the hoax refers to, Jdbgmgr.exe, is a Java Debugger Manager. =
It is a Microsoft file that is installed when you install Windows.

It has a teddy bear icon as described in the hoax:



CAUTION: Jdbgmgr.exe, like any file, can become infected by a virus. One =
virus in particular, W32.Efortune.31384@mm, targets this file. Norton =
AntiVirus has provided protection against W32.Efortune.31384@mm since =
May 11, 2001.

NOTE: If you have already deleted the Jdbgmgr.exe file, some Java =
applets may not run correctly. This is not a critical system file. The =
file version may vary with your operating system and version of Internet =
Explorer. If you want to restore the file, please contact Microsoft for =
instructions. www.microsoft.com     =20




------=_NextPart_001_0288_01C1EC50.8EF3B680
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2715.400" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT face=3DArial size=3D2></FONT>&nbsp;</DIV>
<DIV>
<P><B>Type: <A=20
href=3D"http://securityresponse.symantec.com/avcenter/refa.html#hoax";>Hoa=
x</A></B>=20
<!-- infection length --><!-- systems affected --><!-- systems not =
affected --><!-- CVE References --><!-- threat assessment --><!-- wild - =
section (w/ chart) --><!-- damage - section --><!-- distribution - =
section --><!-- technical description -->
<P><A name=3Dtechnicaldetails><IMG height=3D25 alt=3D"technical details" =

src=3D"http://securityresponse.symantec.com/avcenter/graphics/ssrc/writeu=
ps/section_title_technical.gif"=20
width=3D185><BR>
<P>This is a hoax that, like the<A=20
href=3D"http://securityresponse.symantec.com/avcenter/venc/data/sulfnbk.e=
xe.warning.html"><FONT=20
color=3D#0000ff> SULFNBK.EXE Warning hoax</FONT></A>, tries to persuade =
you to=20
delete a legitimate Windows file from your computer. The file that the =
hoax=20
refers to, Jdbgmgr.exe, is a Java Debugger Manager. It is a Microsoft =
file that=20
is installed when you install Windows.<BR><BR>It has a teddy bear icon =
as=20
described in the hoax:<BR><BR><IMG height=3D84=20
src=3D"http://securityresponse.symantec.com/avcenter/graphics/jdbgmgr.exe=
.file.hoax.1.gif"=20
width=3D103><BR><BR><B>CAUTION:</B> Jdbgmgr.exe, like any file, can =
become=20
infected by a virus. One virus in particular, <A=20
href=3D"http://www.symantec.com/avcenter/venc/data/w32.efortune.31384@mm.=
html"><FONT=20
color=3D#0000ff>W32.Efortune.31384@mm</FONT></A>, targets this file. =
Norton=20
AntiVirus has provided protection against W32.Efortune.31384@mm since =
May 11,=20
2001.<BR><BR><FONT size=3D4><STRONG>NOTE: If you have already deleted =
the=20
Jdbgmgr.exe file, some Java applets may not run correctly. This is not a =

critical system file. The file version may vary with your operating =
system and=20
version of Internet Explorer. If you want to restore the file, please =
contact=20
<FONT size=3D5>Microsoft for instructions. <A=20
href=3D"http://www.microsoft.com";>www.microsoft.com</A>&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;=20
</FONT></STRONG></FONT></P>
<P><FONT face=3DArial size=3D2></FONT>&nbsp;</P></DIV></BODY></HTML>

------=_NextPart_001_0288_01C1EC50.8EF3B680--

------=_NextPart_000_0287_01C1EC50.8EF3B680
Content-Type: image/gif;
        name="section_title_technical.gif"
Content-Transfer-Encoding: base64
Content-Location: 
http://securityresponse.symantec.com/avcenter/graphics/ssrc/writeups/section_title_technical.gif
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------=_NextPart_000_0287_01C1EC50.8EF3B680
Content-Type: image/gif;
        name="jdbgmgr.exe.file.hoax.1.gif"
Content-Transfer-Encoding: base64
Content-Location: 
http://securityresponse.symantec.com/avcenter/graphics/jdbgmgr.exe.file.hoax.1.gif
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------=_NextPart_000_0287_01C1EC50.8EF3B680--




-------------------------------------------------------------------
AGRUPACION LEPROSOS ARGENTINOS   http://www.nob.com.ar
Para ayuda, envie un email a [EMAIL PROTECTED] con subject: HELP
Para escribir en la lista, mande el email con la palabra NOB en
cualquier parte del subject.
-------------------------------------------------------------------

Responder a