Search
Keyword: troj_virtumon.ek
HKEY_CURRENT_USER\software\FCEF85CFB11226DEC8F4F28E315CC3B3\ 123334588BCCCEFF It adds the following registry entries: HKEY_CURRENT_USER\Software\FCEF85CFB11226DEC8F4F28E315CC3B3 ek = "{random values}
HKEY_CURRENT_USER\software\00E1CE22FAA98B60586EB7C3C6AE0340\ 0033456678ABCCEE It adds the following registry entries: HKEY_CURRENT_USER\Software\00E1CE22FAA98B60586EB7C3C6AE0340 ek = "{random values}
HKEY_CURRENT_USER\software\B1E6C5279A27EFBC2AC8D76A7A192525\ 12225567789AAACD It adds the following registry entries: HKEY_CURRENT_USER\Software\B1E6C5279A27EFBC2AC8D76A7A192525 ek = "{random values}
HKEY_CURRENT_USER\software\D4E973BF5A2EEE0F6BFB74863EDC63A4\ 334466678ABBCDEF It adds the following registry entries: HKEY_CURRENT_USER\Software\D4E973BF5A2EEE0F6BFB74863EDC63A4 ek = "{random values}
HKEY_CURRENT_USER\software\49E51A11051C8C51E57122CD7F6BC6CA\ 12256677ABCCCDEF It adds the following registry entries: HKEY_CURRENT_USER\Software\49E51A11051C8C51E57122CD7F6BC6CA ek = "{random values}
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
Beware, Amazon.com users! Spammed messages that arrive with malware attached and disguised as shipping updates from the popular online shopping website are quickly spreading . The email body includes
This worm may be dropped by other malware. As of this writing, the said sites are inaccessible. Arrival Details This worm may be dropped by the following malware: TROJ_DLDR.HB Installation This worm
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_DROPR.TYGS NOTES: It connects to the URL http://{BLOCKED}1.{BLOCKED
It connects to a specific site to send the system information. It connects to the following site to receive commands from a remote user. This Trojan may be dropped by other malware. Arrival Details
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This malware leverages a macro-enabled word document as a malicious spam attachment in order to infect machines with a backdoor. The spammed email message is related to payment remittance. To get a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a