Keyword: vb
3275 Total Search   |   Showing Results : 281 - 300
installation routine: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Explorer\Process LO = "1" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\Schedule AtTaskMaxHours = "48" It adds the following
\Software\VB and VBA Program Settings\ SrvID\ID Dropping Routine This Trojan drops the following files: %System Root%\data.dat (Note: %System Root% is the root folder, which is usually C:\. It is also where
Windows system folder, which is usually C:\Windows\System32.) Other System Modifications This worm adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ untukmu\version
{E14DCE67-8FB7-4721-8149-179BAA4D792C} Other System Modifications This backdoor adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ set\set HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ TypeLib\
Server 2008, and Windows Server 2012.) Other System Modifications This worm adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ String\Strings It adds the following
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Microsoft\Sysinternals It adds the following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Microsoft\Sysinternals PROCID = "7531
2003, or C:\Users\{user name} on Windows Vista and 7.) It adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Microsoft\Sysinternals It adds the following registry
Windows system folder, which is usually C:\Windows\System32.) Other System Modifications This worm adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ untukmu\version
following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ untukmu\version HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ TUX\Path HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ TUX\biang It adds the
C:\Program Files (x86) in Windows XP (64-bit), Vista (64-bit), and 7 (64-bit).) This report is generated via an automated analysis system. Trojan:Win32/VB (Microsoft); Generic VB (McAfee); Trojan Horse
entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Trombeunt\KORREKTUR LASER = "Skolee" This report is generated via an automated analysis system. Fareit-FSN!139BE016CEFC (McAfee);
following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ FImHG11\sbeG0CVLnRoZ30Gfd7SkbII6huuJKdck88 XmRCjm15qLPLcbAH9n6bSRQCLPgvTllGhBtSmHqq61 =
following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Centralmagtlouseberrieslecythidaceous3\gummifabriksstrunkereshigraregnbu udstillerneswanyoromend =
entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ HKA44\c89 K536 = "dkGu181" This report is generated via an automated analysis system.
entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ oWSfH994H209146\oBCRFglGk7veSclO9ASp29OYwuGYW8chx63 tKZdbYuuj1gDz224 = "f2CN130" This report is generated via an automated analysis system.
following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ oWSfH994H209146\oBCRFglGk7veSclO9ASp29OYwuGYW8chx63 tKZdbYuuj1gDz224 = "f2CN130" This report is generated via an automated
following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ v1Xb7i0Cd4JynVrMQo237\XZcOL9cERjEF219 LSw3PksCbngBkMKh7lzB7C75pK1MrE65 = "gHS7xBnj8uPPcBRPb5mKqt210" This report is
entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ v1Xb7i0Cd4JynVrMQo237\XZcOL9cERjEF219 LSw3PksCbngBkMKh7lzB7C75pK1MrE65 = "gHS7xBnj8uPPcBRPb5mKqt210" This report is generated via an automated
entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ l3120\T4xRIUuV147 yzVv23QP4fDF9vK208 = "gkTRa8le7j170" This report is generated via an automated analysis system.
entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ humrsygengeneralauditrskrppernem\AFSEJLINGSTIDSPUNKTERSTRUKTU FLYBLOWINGSKAWKAGERULLENVERDENSBE = "Rekneadparterrersudmattetbiotek" This