Keyword: troj per cent5fmdropper per cent2ebh
87132 Total Search   |   Showing Results : 921 - 940
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Other System Modifications This Trojan deletes the following files: %Windows%\fonts\msgothic.ttf
%TEMP%\IXP000.TMP %TEMP%\_ir_tmpfnt_1 %TEMP%\ir_ext_temp_0 Autostart Technique This worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Other System Modifications This Trojan deletes the following files: %Windows%\fonts\msgothic.ttf
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Other System Modifications This Trojan deletes the following files: %Windows%\fonts\msgothic.ttf
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Other System Modifications This Trojan deletes the following files: %Windows%\fonts\msgothic.ttf
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Other System Modifications This Trojan deletes the following files: %Windows%\fonts\msgothic.ttf
Profile%\Cookies\index.dat (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:\Users\{user name} on
downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Installation This Potentially Unwanted Application adds the following folders: %User Temp%\inH{random}\css
downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Installation This Potentially Unwanted Application adds the following folders: %User Temp%\inH{random}\css
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan drops the following files: %System Root%\spltmp.bmp %User Temp%
files: %User Temp%\ns{random}.tmp\LuaBridge.dll %User Temp%\ns{random}.tmp\System.dll %User Temp%\ns{random}.tmp\lua51.dll %User Temp%\ns{random}.tmp\LuaXml_lib.dll %User Temp%\ns{random}.tmp
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This spyware creates the following folders: %Windows%\Agreehtml (Note: %Windows% is
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run edb7fb7 = "%System Root%\edb7fb7c\edb7fb7c.exe" HKEY_CURRENT_USER\Software
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run 9f4f513 = "%System Root%\9f4f5132\9f4f5132.exe" HKEY_CURRENT_USER\Software
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run ceaa0aa = "%System Root%\ceaa0aa8\ceaa0aa8.exe" HKEY_CURRENT_USER\Software
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run df159ce = "%System Root%\df159ced\df159ced.exe" HKEY_CURRENT_USER\Software
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run e103e28 = "%System Root%\e103e288\e103e288.exe" HKEY_CURRENT_USER\Software
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run 286bac8 = "%System Root%\286bac8f\286bac8f.exe" HKEY_CURRENT_USER\Software
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run edb7fb7 = "%System Root%\edb7fb7c\edb7fb7c.exe" HKEY_CURRENT_USER\Software
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run d288a88 = "%System Root%\d288a882\d288a882.exe" HKEY_CURRENT_USER\Software