Search
Keyword: bkdrhcktck2kc
"2" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ services\clr_optimization_v2.0.50727_32 Start = "2" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\HomeGroup\ UIStatusCache UIStatus = "560
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
(MS12-045) Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution (2698365)
Components 2.8 Service Pack 2 (Windows XP Professional x64 Edition Service Pack 2),Microsoft Data Access Components 2.8 Service Pack 2 (Windows Server 2003 Service Pack 2),Microsoft Data Access Components 2.8
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
\NoAD\Page_Block 0 = "*/ad.*" HKEY_CURRENT_USER\Software\baidu\ BaiduToolbar\NoAD\Page_Block 1 = "http://ad[0-9].*" HKEY_CURRENT_USER\Software\baidu\ BaiduToolbar\NoAD\Page_Block 2 = "http://{BLOCKED}s.
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
Settings\ Zones\2 2500 = "3" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\2 {A8A88C49-5EB2-4990-A1A2-0876022C854F} = "{random values}" HKEY_LOCAL_MACHINE\SOFTWARE
HKEY_LOCAL_MACHINE\Software\Kcommon HKEY_LOCAL_MACHINE\Software\Kcommon\ 1 HKEY_LOCAL_MACHINE\Software\Kcommon\ 2 HKEY_LOCAL_MACHINE\Software\Kcommon\ 3 HKEY_LOCAL_MACHINE\Software\Kcommon\ 4 HKEY_LOCAL_MACHINE
CVE-2011-0602 Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via crafted JP2K record
CVE-2009-3707 VMware Authentication Daemon 1.0 in vmware-authd.exe in the VMware Authorization Service in VMware Workstation 7.0 before 7.0.1 build 227600 and 6.5.x before 6.5.4 build 246459, VMware
CVE-2008-2927 Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in
CVE-2010-0733 Integer overflow in src/backend/executor/nodeHash.c in PostgreSQL 8.4.1 and earlier, and 8.5 through 8.5alpha2, allows remote authenticated users to cause a denial of service (daemon
CVE-2008-1897 The IAX2 channel driver (chan_iax2) in Asterisk Open Source 1.0.x, 1.2.x before 1.2.28, and 1.4.x before 1.4.19.1; Business Edition A.x.x, B.x.x before B.2.5.2, and C.x.x before
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ pdfforge Images2PDF\DefaultIcon HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ pdfforge Images2PDF\shell\open\ command HKEY_LOCAL_MACHINE\SOFTWARE\PDF Architect 2\ Links HKEY_LOCAL_MACHINE
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware disguises itself as FIFA 14-CrackV5. A World Cup-related search can lead users to a supposed key generator for the game FIFA 14. To get a one-glance comprehensive view of the behavior of