Keyword: usoj_ponmcop.sm1
54844 Total Search   |   Showing Results : 21 - 40
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/072201110445.jpeg It is inevitable for vulnerabilities that can be exploited in commercial software to exist. The reasons for this are innumerable
{A3EFBC64-0833-4676-8A5F-F8CAF70A8C03}\InprocServer32 HKEY_CLASSES_ROOT\¹¤³Ì1.IE360 It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ lanren homepages = "www.223la.com/?xuan" HKEY_LOCAL_MACHINE\SOFTWARE
\SYSTEM\CurrentControlSet\ Services\srv{random characters} Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\srv{random characters} ErrorControl = "1" HKEY_LOCAL_MACHINE\SYSTEM
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/206201365712.jpeg A new malware detected as WORM_PIZZER.SM has recently been spotted creating copies of itself in archive files, specifically in
http://findgala.com/?&uid=2116&q={searchTerms} HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Download RunInvalidSignatures = 1 HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings UID
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
\Uninstall\ SmartTool UninstallString = "%Program Files%\SmartTool\Uninstall.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ SmartTool NoModify = "1" HKEY_LOCAL_MACHINE\SOFTWARE
This worm arrives via removable drives. Arrival Details This worm arrives via removable drives. Installation This worm drops the following copies of itself into the affected system and executes them:
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
= "{random characters}" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 Sequence = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ pc power booster TELNO = "(855) 761-8856
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/121201155725.jpegSpammers started the year right with an email message that supposedly led to New Year’s e-cards. Various versions of the spammed
This malware exploits a vulnerability in Internet Explorer to enable remote attackers to execute arbitrary commands on the affected system. The said vulnerability is addressed in the bulletin
entry is {random values} .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced HideFileExt = "1" (Note: The default value data of the said registry entry is 1 .)
\CurrentControlSet\ Services\srv{random hexadecimal number} Start = "1" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\srv{random hexadecimal number} ErrorControl = "1" HKEY_LOCAL_MACHINE\SYSTEM
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
\Uninstall\ {D5B07885-05B5-AF6F-990B-72F2FBD0BE53}_is1 NoModify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ {D5B07885-05B5-AF6F-990B-72F2FBD0BE53}_is1 NoRepair = "1
NoPopUpsOnBoot = "1" Process Termination This worm terminates processes or services that contain any of the following strings if found running in the affected system's memory: ACAAS ArcaConfSV AvastSvc FPAVServer