Search
Keyword: unixliona1
CVE-2008-4066 Mozilla Firefox 2.0.0.14, and other versions before 2.0.0.17, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via HTML-escaped
Technique The scheduled task executes the malware every: 1 minute Other System Modifications This spyware modifies the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\Lsa
Autostart Technique The scheduled task executes the malware every: 1 minute Other System Modifications This spyware modifies the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
\Adobe\ Acrobat Reader\10.0\Installer\ Migrated {AC76BA86-7AD7-1033-7B44-AA0000000001} = "1" HKEY_CURRENT_USER\Software\Adobe\ Acrobat Reader\10.0\Originals bDisplayedSplash = "1" HKEY_CURRENT_USER
CVE-2006-1730 Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute
CVE-2008-4066 Mozilla Firefox 2.0.0.14, and other versions before 2.0.0.17, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via HTML-escaped
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It monitors user transactions on certain sites. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Menu%\Programs\Administrative Tools\{username} %AppDataLocal%Low\Mozilla\{username} %All Users Profile%\Microsoft\Windows\Start Menu\Programs\Java\{username} %AppDataLocal%\pip\cache\http\a\1\9\5\
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
°º_CHAR(0x07)_àà÷x/¸ÃKiKÎÌMö¾ +Ñ {ÏtÛ'J_CHAR(0x11)_mïñÚ\â£i£7×Wáõþñ-H&tmz;HÑ\Ú³ÃKi÷FMHt Ö*qðçÃKiKMHt_CHAR(0x1C)__CHAR(0x14)_ç°ð¢Àëàà÷x/¸þ¢bö%ä/1½÷6¢p0 +b«ìr_CHAR(0x14)_×üô8Æ_CHAR(0x1B)_Óß
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan does not have any propagation routine. It does not have any backdoor routine. It does not drop any other file. It executes the downloaded files. As a result, malicious routines of the
{AC76BA86-7AD7-1033-7B44-AA0000000001} = "1" HKEY_CURRENT_USER\Software\Adobe\ Acrobat Reader\10.0\Originals bDisplayedSplash = "1" HKEY_CURRENT_USER\Software\Adobe\ Acrobat Reader\10.0\AVGeneral bLastExitNormal = "0" HKEY_CURRENT_USER
SFX C%%users%public%Public Document% = "%System Root%\users\public\Public Document" HKEY_CURRENT_USER\Software\Adobe\ Acrobat Reader\10.0\Installer\ Migrated {AC76BA86-7AD7-1033-7B44-AA0000000001} = "1
registry entries: HKEY_CURRENT_USER\Software\Adobe\ Acrobat Reader\10.0\Installer\ Migrated {AC76BA86-7AD7-1033-7B44-AA0000000001} = "1" HKEY_CURRENT_USER\Software\Adobe\ Acrobat Reader\10.0\Originals
\CurrentVersion\BITS It adds the following registry entries: HKEY_CURRENT_USER\Software\Adobe\ Acrobat Reader\10.0\Installer\ Migrated {AC76BA86-7AD7-1033-7B44-AA0000000001} = "1" HKEY_CURRENT_USER\Software\Adobe
\AutoFixer-Pro2018 For {Computer Name} apst = 0 HKEY_LOCAL_MACHINE\SOFTWARE\AutoFixer-Pro2018 For {Computer Name} cbkpoff = 1 HKEY_LOCAL_MACHINE\SOFTWARE\AutoFixer-Pro2018 For {Computer Name} country =