Keyword: usojan.ps1.powload.jkp
54614 Total Search   |   Showing Results : 581 - 600
AM on {date of Installation} - After triggered, repeat every 1 hour indefinitely Action: powershell –nop –w hidden –ep bypass –f %Application Data%\Microsoft\cred.ps1 Name: {Random Name} Trigger: At
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It gathers certain information on the affected
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result,
Creator Default DevMode = "{value}" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\Print\ Printers\PDF Creator Priority = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions.
\ Windows\CurrentVersion\Policies\ System DisableTaskMgr = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Policies\ System LocalAccountTokenFilterPolicy = 1 HKEY_LOCAL_MACHINE \SOFTWARE
LocalAccountTokenFilterPolicy = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Policies\ System EnableLinkedConnections = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Policies\ System
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals certain information from the system and/or
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain
\CurrentVersion\Run encReadmyAutoload = "{Malware path}\How to decrypt files.html" It execute the following command: cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del “{Malware path}\{malware file}.exe” Ransomware
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It lowers the security setting of Internet Explorer.
qwer12345 Huawei@123 123@abc golden 123!@#qwe 1qaz@WSX Ab123 1qaz!QAZ Admin123 Administrator Abc123 Admin@123 999999 Passw0rd 123qwe!@# football welcome 1 12 21 123 321 1234 12345 123123 123321 111111 654321
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
(ies) to disable Task Manager, Registry Tools and Folder Options: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System DisableTaskMgr = "1" Other Details This Trojan connects to