Keyword: win32
73944 Total Search   |   Showing Results : 41 - 60
This is the Trend Micro detection for possibly malicious executable files that are compressed using Win32 compression tools. This proactive detection also includes appending viruses found in the
This is the Trend Micro detection for possibly malicious executable files that are compressed using Win32 compression tools. This proactive detection also includes appending viruses found in the
Backdoor:Win32/Bezigate.B (Microsoft); New Win32 !! (McAfee); Downloader (Symantec); Trojan.Win32.Boht.vhz (Kaspersky); Backdoor.Win32.Bezigate.a (v) (Sunbelt); Could be a Trojan horse Agent (AVG)
{A2D733A7-73B0-4C6B-B0C7-06A432950B66}\ 1.0 HKEY_CLASSES_ROOT\TypeLib\{A2D733A7-73B0-4C6B-B0C7-06A432950B66}\ 1.0\0 HKEY_CLASSES_ROOT\TypeLib\{A2D733A7-73B0-4C6B-B0C7-06A432950B66}\ 1.0\0\win32 HKEY_CLASSES_ROOT\TypeLib\
system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Initialize Win32 = "win32ini.exe" This report is generated via an automated analysis system. Worm:Win32/Heoyon.A (Microsoft
\ControlSet001\ Services\Nationalygq Description = "Providesdjc a domain server for NI security." This report is generated via an automated analysis system. DDoS:Win32/Nitol.A (Microsoft); New Win32 !! (McAfee);
\ControlSet001\ Services\Nationalvtf Description = "Providescmi a domain server for NI security." This report is generated via an automated analysis system. ERROR (Microsoft); New Win32 !! (McAfee);
HKEY_CLASSES_ROOT\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\FLAGS (Default)=4 HKEY_CLASSES_ROOT\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\win32 (Default)=%System%\oleacc.dll HKEY_CLASSES_ROOT
This is the Trend Micro detection for possibly malicious executable files that are compressed using Win32 compression tools. This proactive detection also includes appending viruses found in the
"AdanakIEClientLib" HKEY_CLASSES_ROOT\TypeLib\{8F79BA4B-6A53-4B70-8338-393C30D195F6}\ 1.0\0\win32 @ = {malware path and file name} HKEY_CLASSES_ROOT\TypeLib\{8F79BA4B-6A53-4B70-8338-393C30D195F6}\ 1.0\HELPDIR @ = "
\Classes\ CLSID\{GUID}\InprocServer32 ThreadingModel = Apartment HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ TypeLib\{GUID}\1.0\ 0\win32 (Default) = {Malware file path} HKEY_LOCAL_MACHINE\SOFTWARE\Classes
}s.com/pds/201304/19/40/mswinsck.ocx This report is generated via an automated analysis system. Backdoor:Win32/Blohi.B (Microsoft); New Win32 !! (McAfee); Downloader (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse VB2.VPJ
}s.com/pds/201304/19/40/mswinsck.ocx This report is generated via an automated analysis system. Backdoor:Win32/Blohi.B (Microsoft); New Win32 !! (McAfee); Downloader (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse VB2.UXK
}s.com/pds/201304/19/40/mswinsck.ocx This report is generated via an automated analysis system. Backdoor:Win32/Blohi.B (Microsoft); New Win32 !! (McAfee); Downloader (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse VB2.UXK
system startup: HKEY_CLASSES_ROOT\CLSID\{df2e4f67-e93a-11d1-bb14-0000f8779051}\ InProcServer32 @ = %System%\passthru.dll HKEY_CLASSES_ROOT\TypeLib\{38135D11-E93B-11D1-BB14-0000F8779051}\ 1.0\0\win32 @ =
system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Task Manager Win32 = "%System%\taskmngr32.exe" This report is generated via an automated analysis system.
its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Win32 = "%System%\install\Msnconfig.exe" HKEY_CURRENT_USER\Software\Microsoft\ Windows
\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\FLAGS (Default)=4 HKEY_CLASSES_ROOT\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\win32 (Default)=%System%\oleacc.dll HKEY_CLASSES_ROOT\TypeLib\
" HKEY_CLASSES_ROOT\TypeLib\{8E3C68CD-F500-4A2A-8CB9-132BB38C3573}\ 1.0\0\win32 (Default) = "{malware path and file name}"
{BLOCKED}.184.50 This report is generated via an automated analysis system. DDoS:Win32/Nitol.A (Microsoft); New Win32 !! (McAfee); Trojan-Spy.Win32.Agent.btsm (Kaspersky); Trojan.Win32.Nitol.b (v)