Keyword: usojan.ps1.powload.jkp
54622 Total Search   |   Showing Results : 1221 - 1240
as part of its installation routine: HKEY_CURRENT_USER\Software\ShinoLocker P = %User Temp%\{Random filename 1}.exe HKEY_CURRENT_USER\Software\ShinoLocker PS = %User Temp%\{Random filename 2}.exe
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\Software\ Ask.com.tmp\General iv = {Random Numbers} HKEY_CURRENT_USER\.DEFAULT\Software\ Ask.com.tmp\General 1 = dis HKEY_CURRENT_USER\.DEFAULT\Software\ Ask.com.tmp\General locale = en_US HKEY_CURRENT_USER
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
{hex values}" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" (Note: The default value data of the said registry
data of the said registry entry is 1 .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\1 1406 = "0" (Note: The default value data of the said registry entry is 1 .)
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
vulnerability It adds the following scheduled tasks: Task Name: {random characters} Trigger: Repeat every 1 minute indefinetely. Task to be Run: %Windows%\C:\Windows\Fonts\{random charactes}.exe (Note: %Windows%
every 1 minute indefinetely. Task to be Run: %Windows%\IME\{malware name}.exe (Note: %Windows% is the Windows folder, where it usually is C:\Windows on all Windows operating system versions.) Downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
{hex values}" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" (Note: The default value data of the said registry
\SystemRestore DisableSR = "1" (Note: The default value data of the said registry entry is 0 .) It modifies registry entries to disable the following system services: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
\cached-microdesc-consensus %User Temp%\cached-microdescs.new %User Temp%\lock %User Temp%\state %Application Data%\{16 random alphanumeric characters}.bmp {root drives}\README{number 1 to 10}.txt %Desktop%\README{number 1 to
following: It executes this command if it detects it is being debugged or when run in virtual environment. - cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "{Initial Malware Path}\{Malware Name}.exe" It is
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system