Keyword: my
2065 Total Search   |   Showing Results : 501 - 520
\Winece.exe" NOTES: This malware searches for .DOC and .DOCX files in the current folder, My Documents, and root directory of all drives. The attributes of found files is set to Hidden and System . It then
on Windows Vista and 7.) It creates the following folders: %User Profile%\My Documents\DCSCMIN %User Profile%\Application Data\dclogs (Note: %User Profile% is the current user's profile folder, which
\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced SuperHidden = "0" Dropping Routine This worm drops the following files: %Windows%\services.exe %System Root%\smss.exe A:\my Administrator.exe %System Root%
\ExampleFolder %User Profile%\My Documents\MSDCSC %User Profile%\Application Data\dclogs (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on
Profile%\My Documents\CommonData (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:\Users\{user
Profile%\My Documents\CommonData (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:\Users\{user
to a foler on my computer shEllEXEcuTe = RECyCLER\wmimgmt.com ;8sdaA38G8P343LklJ8ASD FL3333sd0laHsa3G12fgsdsaKd sheLL\oPeN\coMManD =RECYCLER\wmimgmt.com ;343P5gd2fKgCOMNANDASDF=REC
files: %User Profile%\My Documents\New text document.txt (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server
Windows Vista and 7.) It creates the following folders: %User Profile%\My Documents\MSDCSC %User Profile%\Application Data\dclogs (Note: %User Profile% is the current user's profile folder, which is usually
on Windows Vista and 7.) It creates the following folders: %User Profile%\My Documents\DCSCMIN (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\
Server 2003, or C:\Users\{user name} on Windows Vista and 7.) It creates the following folders: %User Profile%\My Documents\MSDCSC %User Profile%\Application Data\dclogs (Note: %User Profile% is the
name} on Windows Vista and 7.) It creates the following folders: %User Profile%\My Documents\MSDCSC %User Profile%\Application Data\dclogs (Note: %User Profile% is the current user's profile folder,
name} on Windows Vista and 7.) It creates the following folders: %User Profile%\My Documents\MSDCSC %User Profile%\Application Data\dclogs (Note: %User Profile% is the current user's profile folder,
\Wilbert %User Profile%\5l6zk1rhu %User Profile%\My Documents\MSDCSC (Note: %System Root% is the root folder, which is usually C:\. It is also where the operating system is located.. %User Profile% is the
Profile%\My Documents\New text document.txt (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:
the following files: %User Profile%\My Documents\New text document.txt %User Temp%\129140.exe (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user
the following files: %User Profile%\My Documents\New text document.txt %User Temp%\66203.exe (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user
Profile%\My Documents\New text document.txt (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:
Dropping Routine This spyware drops the following files: %User Temp%\info.txt %User Profile%\My Documents\man.log (Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and
Dropping Routine This spyware drops the following files: %User Temp%\info.txt %User Profile%\My Documents\man.log (Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and