Keyword: MS10-087
57672 Total Search   |   Showing Results : 2441 - 2460
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
Windows NT, and C:\Documents and Settings\{User name}\Start Menu\Programs\Startup.) Other System Modifications This Trojan modifies the following file(s): database files web files MS Office files video
file types: MS Office Files (.doc, .xls, .ppt, .mdb) Adobe PDF Files (.pdf) Archive Files(.zip, .rar) Program Application Files (.exe) Image Files (.gif, .png, .bmp, .jpg ) Media Files (.mp3, .wma) Other
\ Windows\CurrentVersion\Explorer\ Advanced HideFileExt = 1 (Note: The default value data of the said registry entry is 0 .) File Infection This file infector infects the following file types: MS Office Files
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
\ Windows\CurrentVersion\Explorer\ Advanced HideFileExt = 1 (Note: The default value data of the said registry entry is 0 .) File Infection This file infector infects the following file types: MS Office Files
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
infector infects the following file types: MS Office Files (.doc, .xls, .ppt, .mdb) Adobe PDF Files (.pdf) Archive Files(.zip, .rar) Program Application Files (.exe) Image Files (.gif, .png, .bmp, .jpg )
entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run MS x86 Service = "msservice32.exe" Other System Modifications This
entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run MS x86 Service = "msservice32.exe" Other System Modifications This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run MS x86 Service = "msservice32.exe" Other System Modifications This
entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run MS x86 Service = "msservice32.exe" Other System Modifications This