Keyword: W2KM_DLOADER.BVFO
47485 Total Search   |   Showing Results : 4281 - 4300
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
"0" It modifies the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced Hidden = "2" (Note: The default value data of the said registry entry is
\ Advanced Hidden = "2" (Note: The default value data of the said registry entry is "1" .) Propagation This worm drops the following copy(ies) of itself in all removable drives: {removable drive}:\desktop.exe
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
\Control ActiveService = "BITS" It modifies the following registry key(s)/entry(ies) as part of its installation routine: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\BITS Start = "2" (Note: The
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This Trojan may be dropped by other malware. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious
following registry keys: HKEY_CURRENT_USER\Software\Classes\ .{random 1}\E HKEY_CURRENT_USER\Software\Classes\ .{random 1}\Q HKEY_CURRENT_USER\Software\Classes\ .{random 1}\W It adds the following registry
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
Center\Svc UacDisableNotify = "1" It modifies the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced Hidden = "2" (Note: The default value data of
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival
default value data of the said registry entry is 2 .) This report is generated via an automated analysis system. Virus:Win32/Virut.BN (Microsoft); W32/Autorun.worm.aadb (McAfee); W32.Traxg@mm (Symantec);
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
\Microsoft\ Internet Connection Wizard ShellNext = "http://nbtj.{BLOCKED}ui.com/msn/163.htm?2" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\BITS Start = 2
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
\ Windows\CurrentVersion\Explorer\ Advanced ShowSuperHidden = "0" It modifies the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced Hidden = "2"
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a