Keyword: stoned-b
26489 Total Search   |   Showing Results : 1 - 20
   Next  
NOTES: This is a Trend Micro detection for boot sector virus. It may arrive via floppy drives. It may display the following on the infected computer: Your PC is now Stoned! Virus.Boot.Stoned.a
This Virus arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
Other Details Based on analysis of the codes, it has the following capabilities: This is a DOS virus that may arrive via infected floppy disks. Infects the MBR of the hard disk and stores the
Other Details This file infector does the following: It arrives via floppy drives. This is a DOS virus that may arrive via infected floppy disks. It infects the MBR of the hard disk and stores the
spell spice spider spiderma spred spring springer spunk squires stacey staci stacie stacy starship start startrek startup starwars steak steal steel steph stephani stereo steve stoneage stoned stones
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
\Windows Media Player\5\4\2\a\d\e\6\b\3\6\d\0\f\1\0\a\2\1\6\e\b\5\5\9\8\5\d\d\7\4\e\e\autorun.inf\svchost.exe¡¡ (Note: %Program Files% is the default Program Files folder, usually C:\Program Files.) It
the affected system: %Program Files%\Windows Media Player\5\4\2\a\d\e\6\b\3\6\d\0\f\1\0\a\2\1\6\e\b\5\5\9\8\5\d\d\7\4\e\e\autorun.inf\svchost.exe¡¡ (Note: %Program Files% is the Program Files folder,
\msil_mmcfxcommon.resources_31bf3856ad364e35_6.1.7601.17514_en-us_551cbf74c93dca64 %Windows%\winsxs\x86_microsoft-windows-wpd-status.resources_31bf3856ad364e35_6.1.7600.16385_en-us_084e683222e4e1b4 %AppDataLocal%\pip\cache\http\b\a\9 %System%\DriverStore\FileRepository
This spyware uses the Windows Task Scheduler to add a scheduled task that executes the copies it drops. Installation This spyware drops the following copies of itself into the affected system:
This spyware uses the Windows Task Scheduler to add a scheduled task that executes the copies it drops. Installation This spyware drops the following copies of itself into the affected system:
creates the following folders: %All Users Profile%\Microsoft\Windows %All Users Profile%\Segurazo %System Root%\Users %All Users Profile%\Segurazo\b %All Users Profile%\Segurazo\b\amd64 %All Users Profile%
CVE-2009-2346 The IAX2 protocol implementation in Asterisk Open Source 1.2.x before 1.2.35, 1.4.x before 1.4.26.2, 1.6.0.x before 1.6.0.15, and 1.6.1.x before 1.6.1.6; Business Edition B.x.x before
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities.
`T{]jp" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ Licenses {IEE1F7440C4EA354A} = "B\x00\x00\x00" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ Wow6432Node\CLSID\{11347ACA-6019-BD37-83C6-A3C16253F96A}
CVE-2009-4055 rtp.c in Asterisk Open Source 1.2.x before 1.2.37, 1.4.x before 1.4.27.1, 1.6.0.x before 1.6.0.19, and 1.6.1.x before 1.6.1.11; Business Edition B.x.x before B.2.5.13, C.2.x.x before
STARTPAGE is a family of Trojans designed to modify the affected system's Internet browser's default start page. STARTPAGE redirects the browser to malicious websites. It can also modify the browser
STARTPAGE is a family of Trojans designed to modify the affected system's Internet browser's default start page. STARTPAGE redirects the browser to malicious websites. It can also modify the browser
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a