Keyword: W2KM_MONALIS
46985 Total Search   |   Showing Results : 2721 - 2740
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
Both malware are related to the modified Enfal variants, which were reported to have infected 874 systems in 33 countries. To get a one-glance comprehensive view of the behavior of this Backdoor,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a hidden Internet Explorer window. However, as
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates folders where it drops its files. The
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
\Application Data\Microsoft\{GUID}\{GUID}.exe" HKEY_CURRENT_USER\Software\{random} 2 = "{digit}" HKEY_CURRENT_USER\Software\{random} 3 = "{value}" HKEY_CURRENT_USER\Software\{random} 4 = "{value}
\Application Data\Microsoft\{GUID}\{GUID}.exe" HKEY_CURRENT_USER\Software\{random} 2 = "{digit}" HKEY_CURRENT_USER\Software\{random} 3 = "{value}" HKEY_CURRENT_USER\Software\{random} 4 = "{value}
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This backdoor arrives via peer-to-peer (P2P) shares. It arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
\ Advanced Hidden = "2" (Note: The default value data of the said registry entry is 2 .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced SuperHidden = "0" HKEY_CURRENT_USER
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates folders where it drops its files. It
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates folders where it drops its files. It
These are legitimate executable files whose code has been altered by another malware to serve as an autostart mechanism for the other malware. It checks whether the main malware is already running by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a