Search
Keyword: X2KM_DLOADR
\OPTION dwMainPriority = "2" HKEY_CURRENT_USER\Software\GRETECH\ GOMPLAYER\OPTION nLangResource = "0" HKEY_CURRENT_USER\Software\GRETECH\ GOMPLAYER\OPTION bCheckNetMeeting = "1" HKEY_CURRENT_USER\Software
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
%Windows%\ini\desktop.ini %Windows%\ini\shit.vbs %Windows%\ini\wsock32.dll %Windows%\Tasks\°²×°.bat %Program Files%\Adobe\Reader 10.0\Esl\wsock32.dll %Program Files%\Adobe\Reader 10.0\Reader\AIR\wsock32.dll
Licensing Console Type = "11" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Adobe Licensing Console Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Adobe Licensing Console ErrorControl = "1
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
BARTALEX is a macro malware responsible to a spam outbreak affecting enterprises. It uses Microsoft document and social engineering lures, which in this case, it leverages Automated Clearing House.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
(0x03)_êoj«âæ2÷ª_CHAR(0x1C)__CHAR(0x12)_xâv_CHAR(0x03)_»P)~#ë`_CHAR(0x12)_÷øA_CHAR(0x07)_ÔMv(:4ÉâêÇ_CHAR(0x0E)_ÃêM+M2XbY«22\#ë`_CHAR(0x12)_÷ø
iëîY«2%ÆïûöHR%_CHAR(0x04)_ÌÚ2Mv«Â¦_CHAR(0x05)_Pè
This Trojan may be dropped by other malware. It does not have any propagation routine. It does not have any backdoor routine. When users agree to buy the software, it connects to a certain URL. It
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a