Keyword: bkdrgwgirl272
193 Total Search   |   Showing Results : 121 - 140
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It connects to
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
\Software\UMS api = "272" HKEY_CURRENT_USER\Software\UMS pim = "1492" Dropping Routine This Trojan drops the following files: %User Profile%\Application Data\xxx.html %Application Data%\UMS\cpm.dll
" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\POSWDS Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\POSWDS Type = "272" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\POSWDS\Enum 0 =
entries: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\Alerter Detection Type = "272" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\Alerter Detection Start = "2" HKEY_LOCAL_MACHINE\SYSTEM
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
LocalSystem HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\Microsoft .NET3 Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\Microsoft .NET3 Type = "272" It registers as a system service
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\bddlsvc Type = 272 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\bddlsvc Start = 2 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\bddlsvc
ensure its automatic execution at every system startup by adding the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\cefragsvc Type = 272 HKEY_LOCAL_MACHINE\SYSTEM
every system startup by adding the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\FontSrv Type = 272 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\FontSrv Start
\SerND DisplayName = "Server Network Debug" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\SerND Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\SerND Type = "272