Search
Keyword: possiblestrat2
adds the following registry keys: HKEY_CURRENT_USER\Software\{UID} HKEY_CURRENT_USER\Software\{UID}\ {random key} It adds the following registry entries: HKEY_CURRENT_USER\Software\{UID} {random 2
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
" HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ NetworkAgentDriver t0_lc = "2" HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ NetworkAgentDriver t0_tray = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ NetworkAgentDriver t0_exs = "0
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that exhibit
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that exhibit
2013-0604,MS13-111 Heap-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified
Systems,Windows Server 2012 R2,Windows RT,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
(MS13-053) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2850851)
1,Windows Server 2008 R2 for Itanium-based Systems Service Pack 1,Windows 8 for 32-bit Systems,Windows 8 for 64-bit Systems,Windows Server 2012,Windows RT,Windows Server 2008 for 32-bit Systems Service Pack 2
Server 2012,Windows RT,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server
Systems,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
for Itanium-based Systems Service Pack 1,Windows 8 for 32-bit Systems,Windows 8 for 64-bit Systems,Windows Server 2012,Windows RT,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core
CVE-2010-1813 WebKit in Apple iOS before 4.1 on the iPhone and iPod touch allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via
The mod_ntlm Apache module has been reported prone to a heap overflow vulnerability. The vulnerability occurs due to a lack of sufficient bounds checking performed on user-supplied data, stored in
(MS12-016) Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution (2651026)
CVE-2012-0014,CVE-2012-0015 This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The
MajorVersion = "3" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ Microsoft\Windows\CurrentVersion\ Uninstall\{AD4B77CC-62D4-4FDE-85B2-579927F7647B}_is1 MinorVersion = "2" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
" "shell_scripts/check_if_cscript_is_working.js" cscript "shell_scripts/check_if_cscript_is_working.js" "%System%\PING.EXE" 8.8.8.8 -n 2 -w 500 ping 8.8.8.8 -n 2 -w 500 "%System%\cscript.exe" shell_scripts/shell_ping_after_close.js "http://i-50.
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Hacking Tool arrives on a