Keyword: x97m_laroux.kv
22065 Total Search   |   Showing Results : 41 - 60
Other Details Based on analysis of the codes, it has the following capabilities: This macro virus hooks the macro Auto_Open. It first checks for the file StartUp.xls under XLSTART directory. If it
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
)_3M_CHAR(0x07)_122122" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run x\_CHAR(0x11)_*123n123 = "_CHAR(0x1B)_y-@123_CHAR(0x04)_123" HKEY_CURRENT_USER\Software\Microsoft\ Windows
This Virus arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
.syncdb .sys .system .syw .syx .sz .szs .t .t$m .t01 .t02 .t03 .t04 .t05 .t06 .t07 .t08 .t09 .t10 .t11 .t12 .t13 .t14 .t2 .t2b .t2k .t2ks .t2kt .t2t .t3001 .t3d .t3x .t4g .t64 .t65 .t80 .ta1 .ta2 .ta9 .taac
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions.
= "\x00`X\xd6\x86\x94+@" It deletes the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ TweakBit\PCRepairKit\1.x\ Settings\General.DefWebBrowser Dropping Routine This Potentially
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a