Keyword: mal_otorun1
55879 Total Search   |   Showing Results : 141 - 160
CheckedValue = "0" (Note: The default value data of the said registry entry is 1 .) It deletes the following registry keys: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Control\SafeBoot\Minimal\
NT\CurrentVersion\Image File Execution Options\ regedit.exe It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System DisableRegedit = "1
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan may be dropped by other malware. It automatically executes files when a user opens a drive. Arrival Details This Trojan may be dropped by other malware. Propagation The said .INF file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
ShowSuperHidden = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Windows NT\SystemRestore DisableConfig = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Windows NT\SystemRestore DisableSR = "1
" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ exefile NeverShowExt = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Associations ModRiskFileTypes = ".exe" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001
= "ntsd -d" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ exefile NeverShowExt = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Associations ModRiskFileTypes = ".exe
" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ exefile NeverShowExt = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Associations ModRiskFileTypes = ".exe" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001
registry entry is 1 .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ PCHealth\ErrorReporting ShowUI = "0" (Note: The default value data of the said registry entry is 1 .) HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001
" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ exefile NeverShowExt = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Associations ModRiskFileTypes = ".exe" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001
%Windows%\Help\cliconf.chm" HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Windows\System DisableGPO = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\Image File Execution Options
registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies\ explorer nofind = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ CabinetState
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file