Keyword: MAL_VUNDO-4
68453 Total Search   |   Showing Results : 481 - 500
FastSendDatagramThreshold = "4" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters StandardAddressLength = "18" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters DefaultReceiveWindow = "4
\4 2500 = "3" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\PhishingFilter Enabled = "0" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\PhishingFilter EnabledV8 = "0
\Parameters EnablePMTUBHDetect = "0" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters FastSendDatagramThreshold = "4" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters
\ControlSet001\ Services\Tcpip\Parameters EnablePMTUBHDetect = "0" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters FastSendDatagramThreshold = "4" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001
The SOPICLICK malware family arrives onto systems via the Internet. Its notable routines involve copying the legitimate file, %System%\urlmon.dll and saves it as %User Temp%\x1c{numbers}.dll .
\Parameters FastSendDatagramThreshold = "4" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters StandardAddressLength = "18" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters
\Parameters EnablePMTUBHDetect = "0" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters FastSendDatagramThreshold = "4" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters
" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters FastSendDatagramThreshold = "4" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters StandardAddressLength = "18" HKEY_LOCAL_MACHINE
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters FastSendDatagramThreshold = "4" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters StandardAddressLength = "18" HKEY_LOCAL_MACHINE
FastSendDatagramThreshold = "4" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters StandardAddressLength = "18" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters DefaultReceiveWindow = "4
\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\4 2500 = "3" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\PhishingFilter Enabled = "0" HKEY_CURRENT_USER\Software\Microsoft
FastSendDatagramThreshold = "4" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters StandardAddressLength = "18" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters DefaultReceiveWindow = "4
\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\4 2500 = "3" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\PhishingFilter Enabled = "0" HKEY_CURRENT_USER\Software\Microsoft
The SOPICLICK malware family arrives onto systems via the Internet. Its notable routines involve copying the legitimate file, %System%\urlmon.dll and saves it as %User Temp%\x1c{numbers}.dll .
\ControlSet001\ services\SharedAccess\Parameters\ FirewallPolicy\PublicProfile EnableFirewall = "0" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\MpsSvc Start = "4" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\3 2500 = "3" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\4 2500 = "3" HKEY_CURRENT_USER\Software
4 Lite.ShareReactor.com %Program Files%\Common Files\Microsoft Shared\DW\1031\Winamp 5.0 (en) Crack.ShareReactor.com %Program Files%\Common Files\Microsoft Shared\DW\1033\Winamp 5.0 (en)
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This