Keyword: usojan.ps1.powload.jkp
54622 Total Search   |   Showing Results : 1181 - 1200
This worm adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies NoDispCPL = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion
value data of the said registry entry is 1 .) HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Control\FileSystem LongPathsEnabled = 1 (Note: The default value data of the said registry entry is 0 .)
as part of its installation routine: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Explorer NoFolderOptions = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This is the Trend Micro detection for ransomware known as CryptXXX 3.0 . This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
WD_LOG_FLAG_FUNCTION_TRACE WD_LOG_FLAG_ASSERT" It modifies the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ ZoneMap ProxyBypass= = "1" HKEY_CURRENT_USER\Software
Melbourne@719% 123. password01! jlkdkfdj34#$ 101010 smart 123456123 9379992 saas 1234567890 root123 222222 1 toshiba 159951 P@ssword1 P@ssw0rd1 admin123456 123!@#qwe 9999 1qazXSW@ brain password@12345 letmein
DisableRegistryTools = 1 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgr = 1 HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System DisableCMD = 1 This ransomware display
following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" (Note: The default value data of the said registry entry is 0 .) It modifies registry
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that exhibit
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to Internet Relay Chat (IRC) servers. It
taskkill /f /im taskmgr.exe cmd /c %User Temp%\sqlagentc.exe --donate-level 1 --max-cpu-usage 75 -o o.vollar.ga:80 -u x.9c -p x -k >%User Temp%\CPU_log.txt taskkill /f /im SQLAGENTVTW.exe taskkill /f /im
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" (Note: The default value data of the said registry entry is 0 .) It modifies registry entries to disable the following system
modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping Routine This Trojan drops the following files: %System Root%
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive