Keyword: MAL_VUNDO-4
68453 Total Search   |   Showing Results : 341 - 360
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: BKDR_TOFSEE.B If your Trend Micro
This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to the following malware: BKDR_IRCBOT BKDR_SPOES TROJ_IRCBRUTE WORM_KOLABC WORM_POEBOT
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TSPY_ONLINEG TROJ_NSANTI If your Trend Micro product
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_DLOADER TROJ_SWIZZOR
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_BAGLE TROJ_POLYCRYPT WORM_SDBOT
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_ NUWAR TROJ_TIBS WORM_ZHELAT If
This is the Trend Micro heuristic detection for suspicious files that manifest behavior and characteristics similar to WORM_AUTORUN variants. Files detected usually drop a copy of itself and
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
\ Explorer NoStartMenuNetworkPlaces = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies\ Explorer NoDrives = "4" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
\downloads\Virtual Girl crack all versions.exe %Program Files%\gnucleus\downloads\FireWorks 4 crack all versions.exe %Program Files%\gnucleus\downloads\FIreWorks MX crack all versions.exe %Program Files%
\Software\WinRAR\ Profiles\2 HKEY_CURRENT_USER\Software\WinRAR\ Profiles\3 HKEY_CURRENT_USER\Software\WinRAR\ Profiles\4 HKEY_CURRENT_USER\Software\WinRAR\ General HKEY_CURRENT_USER\Software\WinRAR\ Interface
as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan Spy adds the following folders: %User Temp%\{random 4 characters}
\4 2001 = "0" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\4 2004 = "0" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\4