Keyword: usojan.ps1.powload.jkp
54622 Total Search   |   Showing Results : 1161 - 1180
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
versions.) It adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ SessionInfo\1\WHCIconStartup HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion
Options: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System DisableTaskMgr = "1" Dropping Routine This File infector drops the following files: %AppDataLocal%\Microsoft\Internet
\Software\5NZQ29B3L2 Vle2 = "fvKr4YcIHEpf1Fc=" HKEY_CURRENT_USER\Software\5NZQ29B3L2 VhyK = "4a3" HKEY_CURRENT_USER\Software\5NZQ29B3L2 Vhy2 = "1" HKEY_CURRENT_USER\Software\5NZQ29B3L2 VhyE3 = "1
\ControlSet001\ services\wbengine Start = 4 (Note: The default value data of the said registry entry is 3 .) HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Control\FileSystem LongPathEnabled = 1 (Note: The default value
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and
Inj = "1" HKEY_CURRENT_USER\Software\remcos_hvbmtksknx FR = "1" It deletes the following registry keys: HKEY_CURRENT_USER\Software\remcos_hvbmtksknx\ Inj Dropping Routine This File infector drops the
\ Security Center\Svc FirewallOverride = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center\Svc FirewallDisableNotify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center\Svc
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\CurrentVersion\Policies\ System DisableRegistryTools = 1 HKCU\Software\Microsoft\ Windows\CurrentVersion\Policies\ System DisableTaskMgr = 1 HKCU\Software\Microsoft\ Windows\CurrentVersion\Policies\ System
{bootmgr} displaybootmenu no cmd.exe /C Net user D3g1d5 Dwixtkj37 /add cmd.exe /C Net localgroup Administrators D3g1d5 /add cmd.exe /C ping 6.9.6.9 -n 1 -w 1 {Malware Path} \ Autostart Technique This
\ Internet Account Manager\Accounts\Active Directory GC LDAP Server ID = "0" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP Server ID = "1" HKEY_CURRENT_USER\Software
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ 7-Zip NoModify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ 7-Zip NoRepair = "1" HKEY_LOCAL_MACHINE\SOFTWARE