Keyword: MS10-087
57578 Total Search   |   Showing Results : 2421 - 2440
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Once a malware successfully exploits the said
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various system
64, or blank}.exe %User Profile%\{random folder name}\{string 1}{string 2}{32, 64, or blank}.exe where string 1 can be any of the following: win cmd disk dsk ms hp intel amd dll tcp udp string 2 can be
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various system
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various system
the aforementioned URL using the Insert and Link feature found in MS Word . This feature is used so that when the link is inaccessible or cannot be loaded, it still displays the image.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
.png, .bmp, .jpg ) Media Files (.mp3, .wma) MS Office Files (.doc, .xls, .ppt, .mdb) Program Application Files (.exe) This ransomware also connects to URLs and IP addresses to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various system
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
Windows NT, and C:\Documents and Settings\{User name}\Start Menu\Programs\Startup.) Other System Modifications This Trojan modifies the following file(s): database files web files MS Office files video
file types: MS Office Files (.doc, .xls, .ppt, .mdb) Adobe PDF Files (.pdf) Archive Files(.zip, .rar) Program Application Files (.exe) Image Files (.gif, .png, .bmp, .jpg ) Media Files (.mp3, .wma) Other
\ Windows\CurrentVersion\Explorer\ Advanced HideFileExt = 1 (Note: The default value data of the said registry entry is 0 .) File Infection This file infector infects the following file types: MS Office Files
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a