Keyword: win32
73928 Total Search   |   Showing Results : 21 - 40
{248DD890-BB45-11CF-9ABC-0080C7E7B78D} HKEY_CLASSES_ROOT\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\ 1.0\0\win32 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ MSWinsock.Winsock HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ MSWinsock.Winsock.1
{34C83402-408B-4031-9FCE-B1D89FFB6F4C}\ 1.0\0\win32 Default = "%windir%\miskar.dll" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ Microsoft\Windows\CurrentVersion\ explorer Publish = "Version64x2" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node
application bundled with it in the user's Temp folder. NOTES: This is the Trend Micro detection for: Win32 Self-Extracting Cabinet files created by WORM_PROLACO.EK. The said file contains a copy of
\TypeLib\{BE7650B2-5936-4EE6-B4F2-AE385DB13A90}\ 1.0\0\win32 HKEY_CLASSES_ROOT\TypeLib\{BE7650B2-5936-4EE6-B4F2-AE385DB13A90}\ 1.0\FLAGS HKEY_CLASSES_ROOT\TypeLib\{BE7650B2-5936-4EE6-B4F2-AE385DB13A90}\ 1.0
HKEY_CURRENT_USER\Software\Microsoft\ TCFTP This report is generated via an automated analysis system. New Win32 !! (McAfee); Trojan.Win32.Patched.lw (Kaspersky)
}dult.biz/redux.gif This report is generated via an automated analysis system. PWS:Win32/Ldpinch.BC (Microsoft); New Win32 !! (McAfee); Downloader (Symantec); LooksLike.Win32.InfectedFile!A (v) (Sunbelt);
Apache 2.0.28 Beta,Apache Software Foundation Apache 2.0.32 -BETA win32,Apache Software Foundation Apache 2.0.34 -BETA win32 Apply associated Trend Micro DPI Rules. 1000634| 1000634 - Apache 2.0 Path
content URL, as demonstrated in the filename portion of a .mp3 file. NullSoft Shoutcast Server 1.9.4 Linux,NullSoft Shoutcast Server 1.9.4 Mac OS X,NullSoft Shoutcast Server 1.9.4 Win32 Trend Micro Deep
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan creates the following folders: %System Root%\win32 (Note: %System Root%
system. Worm:Win32/Mamianune.gen (Microsoft); New Win32 !! (McAfee); W32.Mamianune (Symantec); Email-Worm.Win32.Mamianune.lf (Kaspersky); Worm.Win32.Ratab.a (v) (Sunbelt); I-Worm/Tuxy.A (AVG)
" HKEY_CLASSES_ROOT\TypeLib\{BA5B874B-C72A-4529-B2CF-D7485602D541}\ 1.0\0\win32 {Default} = "{Adware Path and File Name}" HKEY_CLASSES_ROOT\TypeLib\{BA5B874B-C72A-4529-B2CF-D7485602D541}\ 1.0\FLAGS {Default} = "0
{A2D733A7-73B0-4C6B-B0C7-06A432950B66}\ 1.0 HKEY_CLASSES_ROOT\TypeLib\{A2D733A7-73B0-4C6B-B0C7-06A432950B66}\ 1.0\0 HKEY_CLASSES_ROOT\TypeLib\{A2D733A7-73B0-4C6B-B0C7-06A432950B66}\ 1.0\0\win32 HKEY_CLASSES_ROOT\TypeLib\
{04E2B965-08D5-45FF-8F70-8C4CF5FBE3C3}\ 1.0 HKEY_CLASSES_ROOT\TypeLib\{04E2B965-08D5-45FF-8F70-8C4CF5FBE3C3}\ 1.0\0 HKEY_CLASSES_ROOT\TypeLib\{04E2B965-08D5-45FF-8F70-8C4CF5FBE3C3}\ 1.0\0\win32 HKEY_CLASSES_ROOT\TypeLib\
report is generated via an automated analysis system. Backdoor:Win32/Blohi.B (Microsoft); New Win32 !! (McAfee); Downloader (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse VB2.VVY (AVG)
{CE7C3CE2-4B15-11D1-ABED-709549C10000}\ 1.0\0\win32 (Default) = {Malware path and file name}.dll
{0E05704B-07AB-41EB-8A17-F007AFBB5AA5}\ 1.0\0\win32 {default} = "%System%\MediaP.dll" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CLSID\{C881E764-E445-4EAC-9480-898E25DAEE3B}\InprocServer32 {default} = "%System%\MediaP.dll" HKEY_LOCAL_MACHINE
This is the Trend Micro detection for possibly malicious executable files that are compressed using Win32 compression tools. This proactive detection also includes appending viruses found in the
This is the Trend Micro detection for possibly malicious executable files that are compressed using Win32 compression tools. This proactive detection also includes appending viruses found in the
This is the Trend Micro detection for possibly malicious executable files that are compressed using Win32 compression tools. This proactive detection also includes appending viruses found in the
This is the Trend Micro detection for possibly malicious executable files that are compressed using Win32 compression tools. This proactive detection also includes appending viruses found in the