Keyword: vb
3275 Total Search   |   Showing Results : 301 - 320
following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ untukmu\version HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ TUX\Path HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ TUX\biang It adds the
registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Microsoft\Sysinternals It adds the following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Microsoft
keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ L!NK\1 It adds the following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ L!NK\1 0 = "8A5997F8
following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ untukmu\version HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ TUX\Path HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ TUX\biang It adds the
keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ L!NK\1 It adds the following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ L!NK\1 0 = "D02119D0
\SYSTEM\ControlSet001\ Services\Nationalrde Description = "Providesacb a domain server for NI security." Dropping Routine This Trojan drops the following files: %User Temp%\VB Runtimes Pack, release 7
\scs2.tmp (Note: %Temp% is the Windows Temporary folder, which is usually C:\Windows\Temp or C:\WINNT\Temp.) It adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Local
Settings = It adds the following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Microsoft\Windows IDurl = http://www.ii9i.net/mm/11/m.asp HKEY_CURRENT_USER\Software\Microsoft
following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ nWUgXhY3O8iBMDR5164\Tv0YqV6YRFZbOcnhT5 bcwmCWoDe248 = "wQaIedOO5pb0Pw8A4Yq13q9U138" This report is generated via an
Components\{B2AAFEEB-F8BC-F806-BFAB-E2CE7C429F51} HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Active Setup\Installed Components\{B2AAFEEB-F8BC-F806-BFAB-E2CE7C429F51} HKEY_CURRENT_USER\Software\VB and VBA Program
infector adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ titta\version HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ untukmu2\version It adds the following
Trojan adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ RTR\TR It adds the following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ RTR
itself into the affected system: %Application Data%\vb\sandboxi.exe (Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}\Application Data on
\Software\VB and VBA Program Settings\ win\options It creates the following registry entry(ies) to disable Task Manager, Registry Tools and Folder Options: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
report is generated via an automated analysis system. Trojan:Win32/Agent (Microsoft); Generic VB (McAfee); Trojan Horse (Symantec); Trojan.Win32.VB.als, Trojan.Win32.VB.bdz (Kaspersky);
and Settings\{user name} on Windows 2000, XP, and Server 2003.) It adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Windows Update\Windows Update It adds the
(64-bit), and 7 (64-bit).) It adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Microsoft\Sysinternals HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT
\ Control\MediaResources msvideo = It adds the following registry entries as part of its installation routine: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ INSTALL\DATE {Random Value} = {Date of
\ TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\ 0 HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ ummf\ummf
Process = "%System%\scvhost.exe" Other System Modifications This backdoor adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ set\set HKEY_LOCAL_MACHINE\SYSTEM