Keyword: usojan.ps1.powload.jkp
54622 Total Search   |   Showing Results : 1361 - 1380
\Policies\ Microsoft\Windows\OneDrive DisableFileSyncNGSC = 1 HKEY_CLASSES_ROOT\.fang\DefaultIcon HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows NT\SystemRestore DisableSR = 1 HKEY_LOCAL_MACHINE\Software
This Dharma variant uses a new technique: using software installation as a distraction to help hide malicious activities. This Ransomware arrives on a system as a file dropped by other malware or as
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions.
every: 1 minute Other System Modifications This Trojan changes the desktop wallpaper by modifying the following registry entries: HKEY_CURRENT_USER\Control Panel\Desktop Wallpaper = %User Temp%\{random
entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" (Note: The default value data of the said registry entry is 0 .) Other Details This Trojan connects to
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. As of this
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings ProxyEnable = "1" (Note: The default value data of the said registry entry is {user-defined} .) HKEY_CURRENT_USER\Software\Microsoft
The default value data of the said registry entry is {user-defined} .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings ProxyEnable = "1" (Note: The default value data of
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
Manager: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System DisableTaskMgr = "1" Other Details This Trojan encrypts files with the following extensions: .3ds .3fr .3pr .ab4 .ac2
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings ProxyEnable = "1" (Note: The default value data of the said registry entry is {user-defined} .) HKEY_CURRENT_USER\Software\Microsoft
following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Toolbar Locked = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ SystemCertificates\AuthRoot\Certificates
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be dropped by the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is capable of encrypting files in the affected
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It gathers certain information on the affected
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This