Keyword: w97m_marker
21162 Total Search   |   Showing Results : 41 - 60
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
\ 1926745233 1651272023 = "97" HKEY_CURRENT_USER\Software\Afqteuv\ 1926745233 -992423250 = "0" HKEY_CURRENT_USER\Software\Wilbert914\ 1926745233 1651272023 = "2a" HKEY_CURRENT_USER\Software\Wilbert914
This file infector may be dropped by other malware. It creates an infection marker in infected files. Arrival Details This file infector may be dropped by other malware. This malware arrives via the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
Installation This Ransomware drops the following files: %Desktop%\SUA_CHAVE.html - infection marker (Note: %Desktop% is the desktop folder, where it usually is C:\Documents and Settings\{user name}\Desktop in
Installation This Ransomware drops the following files: {Encrypted File Directory}\Touch ← Marker to check if the directory is already encrypted, deleted afterwards. It adds the following processes: "cmd.exe" /C
%Application Data%\APMV\APMV.exe.flag - marker %Application Data%\APMV\APMV.id - victim ID %Application Data%\APMV\APMV.dat - timestamp {source directory}\Defines.inc - contains malicious code in array form
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
sites. It infects files by overwriting code in the entry point and saving the overwritten code in the virus body. It then appends the virus body to the host file. It creates an infection marker in infected
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
"_CHAR(0x0E)_GŠ" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run J/]162@162 = "RIo162Š162" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run (q_CHAR(0x10)_163 163 = "M