Keyword: troj per cent5fmdropper per cent2ebh
87132 Total Search   |   Showing Results : 21 - 40
following folders: %User Profile%\47275626C69675 %User Temp%\C5C555A0D536B5DBB0 %User Temp%\C5C555A0D536B5DBB0\MUSICA %User Temp%\C5C555A0D536B5DBB0\PELICULAS %User Temp%\C5C555A0D536B5DBB0\PROGRAMAS %User
\Magic Video Converter 8 0 2 18.exe %Program Files%\icq\shared folder\Google Earth Pro 4.2. with Maps and crack.exe %Program Files%\icq\shared folder\AVS video converter6.exe %Program Files%\icq\shared
following folders: %User Profile%\47275626C69675 %User Temp%\C5C555A0D536B5DBB0 %User Temp%\C5C555A0D536B5DBB0\MUSICA %User Temp%\C5C555A0D536B5DBB0\PELICULAS %User Temp%\C5C555A0D536B5DBB0\PROGRAMAS %User
following folders: %User Profile%\47275626C69675 %User Temp%\C5C555A0D536B5DBB0 %User Temp%\C5C555A0D536B5DBB0\MUSICA %User Temp%\C5C555A0D536B5DBB0\PELICULAS %User Temp%\C5C555A0D536B5DBB0\PROGRAMAS %User
following folders: %User Profile%\47275626C69675 %User Temp%\C5C555A0D536B5DBB0 %User Temp%\C5C555A0D536B5DBB0\MUSICA %User Temp%\C5C555A0D536B5DBB0\PELICULAS %User Temp%\C5C555A0D536B5DBB0\PROGRAMAS %User
following folders: %User Profile%\47275626C69675 %User Temp%\C5C555A0D536B5DBB0 %User Temp%\C5C555A0D536B5DBB0\MUSICA %User Temp%\C5C555A0D536B5DBB0\PELICULAS %User Temp%\C5C555A0D536B5DBB0\PROGRAMAS %User
following folders: %User Profile%\47275626C69675 %User Temp%\C5C555A0D536B5DBB0 %User Temp%\C5C555A0D536B5DBB0\MUSICA %User Temp%\C5C555A0D536B5DBB0\PELICULAS %User Temp%\C5C555A0D536B5DBB0\PROGRAMAS %User
affected system: %system%\wmimngr.exe It drops the following component file(s): %WINDOWS%\oracle.ocx - non-malicious It drops and executes the following files: %System%\wpmgr.exe - detected by Trend Micro as
following folders: %User Profile%\47275626C69675 %User Temp%\C5C555A0D536B5DBB0 %User Temp%\C5C555A0D536B5DBB0\MUSICA %User Temp%\C5C555A0D536B5DBB0\PELICULAS %User Temp%\C5C555A0D536B5DBB0\PROGRAMAS %User
following folders: %User Profile%\47275626C69675 %User Temp%\C5C555A0D536B5DBB0 %User Temp%\C5C555A0D536B5DBB0\MUSICA %User Temp%\C5C555A0D536B5DBB0\PELICULAS %User Temp%\C5C555A0D536B5DBB0\PROGRAMAS %User
following folders: %User Profile%\47275626C69675 %User Temp%\C5C555A0D536B5DBB0 %User Temp%\C5C555A0D536B5DBB0\MUSICA %User Temp%\C5C555A0D536B5DBB0\PELICULAS %User Temp%\C5C555A0D536B5DBB0\PROGRAMAS %User
following folders: %User Profile%\47275626C69675 %User Temp%\C5C555A0D536B5DBB0 %User Temp%\C5C555A0D536B5DBB0\MUSICA %User Temp%\C5C555A0D536B5DBB0\PELICULAS %User Temp%\C5C555A0D536B5DBB0\PROGRAMAS %User
following folders: %User Profile%\47275626C69675 %User Temp%\C5C555A0D536B5DBB0 %User Temp%\C5C555A0D536B5DBB0\MUSICA %User Temp%\C5C555A0D536B5DBB0\PELICULAS %User Temp%\C5C555A0D536B5DBB0\PROGRAMAS %User
following folders: %User Profile%\47275626C69675 %User Temp%\C5C555A0D536B5DBB0 %User Temp%\C5C555A0D536B5DBB0\MUSICA %User Temp%\C5C555A0D536B5DBB0\PELICULAS %User Temp%\C5C555A0D536B5DBB0\PROGRAMAS %User
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run MidiaCenter = "%User Profile%\Application Data\cent.exe" Other System Modifications This Trojan adds the
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run ppntay = "%System%\ppntay.exe" HKEY_CURRENT_USER\Software\Microsoft\ Windows
following folders: %User Temp%\1.tmp (Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Other System Modifications This Trojan deletes the following files: %System Root%\AUTOEXEC.BAT
dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This worm creates the following folders: %System Root%\00000000000000000000000000 %System
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan creates the following folders: %Windows%\messenger %System%\JSsetup