Keyword: vb
3275 Total Search   |   Showing Results : 21 - 40
Modifications This Trojan Spy adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ %User Temp%\namebro HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ %User Temp%
Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit).) Other System Modifications This Trojan Spy adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings
Other System Modifications This spyware adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ {System Root} HKEY_CURRENT_USER\Software\VB and VBA Program Settings\
\Software\VB and VBA Program Settings\ P0HEBt91\WvvjIuStCTExBDCldRQ6V4105 C24SB5160 = "u8Nqk9gBh950HfSD8dpUVj2CdndfajjrlGJPu183" HKEY_CURRENT_USER\Software\VB and VBA Program Settings
as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Ransomware drops the following files: %Program Files%\vb\wifi hacker
\Common Files\dmx.exe" Other System Modifications This Trojan adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ C:\Documents and Settings\All Users\ Common Files\logs
\System32.. %Temp% is the Windows Temporary folder, which is usually C:\Windows\Temp.) It adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Options\Windows XP
\{user name} on Windows Vista and 7.) Other System Modifications This spyware adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ %User Profile%\Start Menu
System Modifications This Backdoor adds the following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ C6XZLJ6Hv8dArTFmX2l8hgiIChq4CrI64GsHSBV206
\Software\Microsoft\ Windows Script\Settings HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ The Net\settings HKEY_CURRENT_USER\Software\Microsoft\ Visual Basic\6.0 It adds the following registry
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Options\Windows XP HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ KZPXLHVLK58059210000LLGQF\KZPXLHVLK58059210000LLGQF It adds the following registry
\Software\VB and VBA Program Settings\ SrvID\ID HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ INSTALL\DATE It adds the following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ fanners\forhaabentligt regaliernes = "Circumesophageal4" HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ STRUBEHOSTEN\Macrocephalia3 Korona1 = "bldgrers
System Modifications This Worm adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ f\f HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ ;net\[ONeShot] It adds
" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\RunOnceEx minimo = "%Windows%\Fonts\lsass.exe" Other System Modifications This backdoor adds the following registry keys: HKEY_CURRENT_USER\Software\VB and
registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ Options\Windows XP HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ CSUBRPQ90510510000GGTEUL\CSUBRPQ90510510000GGTEUL It adds the
Data\smss.exe" (Note: The default value data of the said registry entry is Explorer.exe .) Other System Modifications This worm adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ ml\pip HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ ml\cx HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ ml\inst HKEY_CLASSES_ROOT
versions.) It adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ WPCLCMVKESEMSBJMGWYYLZZBRZDEWXCMQSJUPOETUWRFTZJXLYYHNJZQDTLPNCYQGQKCLTGEKIKNLGSQZDWZULDZQPS222\{random
\Software\VB and VBA Program Settings\ simunclathe\main It adds the following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ simunclathe\main ncname = "gsk980" HKEY_CURRENT_USER