Keyword: MAL_VUNDO-4
68453 Total Search   |   Showing Results : 361 - 380
HKEY_LOCAL_MACHINE\Software\MPMP\ Plugins\93 HKEY_LOCAL_MACHINE\Software\MPMP\ Plugins\91 HKEY_LOCAL_MACHINE\Software\MPMP\ Plugins\246 HKEY_LOCAL_MACHINE\Software\MPMP\ Plugins\4 HKEY_LOCAL_MACHINE\Software\MPMP
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
for 32-bit Systems Service Pack 2 Microsoft .NET Framework 3.5 Service Pack 1,Windows Server 2008 for 32-bit Systems Service Pack 2 Microsoft .NET Framework 4,Microsoft .NET Framework 4 Microsoft .NET
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\DOCUME~1\ADMINI~1 %User Profile%\LOCALS~1 %User Temp%\nsz3.tmp %User Temp%\is-R5A6J.tmp %User Temp%\is-J144P.tmp %User Temp%\is-J144P.tmp\_isetup %Program Files%\Hot CPU Tester Pro 4 %Start Menu%\Programs
CVE-2012-1855 When exploited, a vulnerability in several versions of Microsoft .NET Framework could allow an attacker to execute code remotely. An attacker needs to trick intended victims to access a
),Microsoft .NET Framework 4 (Windows XP Service Pack 3),Microsoft .NET Framework 1.1 Service Pack 1 (Windows XP Professional x64 Edition Service Pack 2),Microsoft .NET Framework 2.0 Service Pack 2 (Windows XP
NoPopupManagement = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\4 2301 = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\4
"0" HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Internet Explorer\Restrictions NoPopupManagement = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\4
\Restrictions NoPopupManagement = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\4 1208 = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet
" HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Internet Explorer\Restrictions NoPopupManagement = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\4 2301 = "0
Player\c\f\c\d\2\0\8\4\9\5\d\5\6\5\e\f\6\6\e\7\d\f\f\9\f\9\8\7\6\4\d\a\autorun.inf\svchost.exe¡¡ (Note: %Program Files% is the default Program Files folder, usually C:\Program Files.) It creates the
CVE-2012-0160,CVE-2012-0161 This update resolves vulnerabilities in some versions of the .NET Framework. When a vulnerable system accesses a specially crafted webpage via browser that runs XAML
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies Internet Explorer security settings. This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm drops its component files in all removable drives. The dropped AUTORUN.INF is detected by Trend Micro as Mal_Otorun1. This worm drops an AUTORUN.INF file to automatically execute the copies