Keyword: tr
3430 Total Search   |   Showing Results : 1 - 20
   Next  
This malicious URL downloads a file detected as TR
service to ensure its automatic execution at every system startup by adding the following registry entries: u r = tr It adds the following registry entries to enable its automatic execution at every system
tr element and the "insertion, deletion and attributes of a table cell," which trigger memory corruption when the window is destroyed, aka "DHTML Object Memory Corruption Vulnerability." Microsoft
\Software\VB and VBA Program Settings\ RTR\TR It adds the following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ RTR\TR RT = "{random characters}" HKEY_LOCAL_MACHINE\SYSTEM
Dropper!1eq (McAfee); PAK:PE_Patch, PAK:PE_Patch.PECompact, PAK:PecBundle, PAK:PECompact, Trojan-Dropper.Win32.VB.bdsm, Tr (Kaspersky); Trojan.Win32.Generic.pak!cobra (Sunbelt); Trojan.Generic.6782510
Trojan adds the following registry keys: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ RTR\TR It adds the following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ RTR
registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion tr = [REG_EXPAND_SZ, value: ] HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion cf = [REG_EXPAND_SZ, value: ] This
\shell\ runas\command HKEY_CURRENT_USER\Tr HKEY_CURRENT_USER\Tr\DefaultIcon HKEY_CURRENT_USER\Tr\shell HKEY_CURRENT_USER\Tr\shell\ open HKEY_CURRENT_USER\Tr\shell\ open\command HKEY_CURRENT_USER\Tr\shell
generated via an automated analysis system. Trojan:Win32/Pterodo.B [non_writable_container], Trojan:Win32/Pterodo.B [non_writable_container], Tr (Microsoft); RDN/Generic.grp (McAfee);
\fx35sp1client\DotNetClientFx\tr %User Temp%\PdnSetup\fx35sp1client\DotNetClientFx\zh-CN %User Temp%\PdnSetup\fx35sp1client\DotNetClientFx\zh-TW %User Temp%\PdnSetup\fx35sp1client\Langpacks %User Temp%\PdnSetup
\sv-SE\RC.resources.dll %Program Files%\ErrorFix KIT\sv-SE\RC.resources.dll %Program Files%\ErrorFix KIT\ko\RC.resources.dll %Program Files%\ErrorFix KIT\ko\RC.resources.dll %Program Files%\ErrorFix KIT\tr
Windows operating system versions.) It drops the following files: %Windows%\tr %Windows%\black.bmp (Note: %Windows% is the Windows folder, where it usually is C:\Windows on all Windows operating system
\RegistryBooster\locale\ru\ru.dll %Program Files%\Uniblue\RegistryBooster\locale\se\LC_MESSAGES\messages.mo %Program Files%\Uniblue\RegistryBooster\locale\se\se.dll %Program Files%\Uniblue\RegistryBooster\locale\tr
\WinZip Driver Updater\offline\registration\tr %Program Files%\WinZip Driver Updater\offline\exitdialog %Program Files%\WinZip Smart Monitor %Program Files%\WinZip Driver Updater\offline\registration\zh-tw
"679ec0f7-4688-4d70-ba6a-366cf9328232" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Software Notifier Tr = "e555ee5f279db072e3d207fd85216021" HKEY_CURRENT_USER\Control Panel\Desktop ConvertedWallpaper = "%System%\phc3u8j0eral.bmp
{malware file name}\890\fr %User Temp%\.net\{malware file name} %User Temp%\.net %User Temp%\.net\{malware file name}\890\zh-Hans %User Temp%\.net\{malware file name}\890\tr %User Temp%\.net\{malware file
Driver Updater\offline\exitdialog\ru\exitdialog.html %Program Files%\WinZip Driver Updater\offline\exitdialog\sv\exitdialog.html %Program Files%\WinZip Driver Updater\offline\exitdialog\tr\exitdialog.html
Driver Updater\offline\exitdialog\ru\exitdialog.html %Program Files%\WinZip Driver Updater\offline\exitdialog\sv\exitdialog.html %Program Files%\WinZip Driver Updater\offline\exitdialog\tr\exitdialog.html
Driver Updater\offline\exitdialog\ru\exitdialog.html %Program Files%\WinZip Driver Updater\offline\exitdialog\sv\exitdialog.html %Program Files%\WinZip Driver Updater\offline\exitdialog\tr\exitdialog.html
Driver Updater\offline\exitdialog\tr\exitdialog.html %Program Files%\WinZip Driver Updater\offline\exitdialog\zh-tw\exitdialog.html %Program Files%\WinZip Driver Updater\offline\learnmore\dpi_125