Search
Keyword: unixliona1
Once users access any of the monitored sites, it starts logging keystrokes. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
currentuser, honey, sandbox or vmware terminate itself if its path and name is C:\sample.exe bypass the firewall by running the command netsh firewall add allowedprogram {malware name} 1 ENABLE use the following
\Microsoft\ Internet Explorer\MINIE CommandBarEnabled = "1" HKEY_LOCAL_MACHINE\SOFTWARE\SiteFinder pid = "DFE0DEC6-2857-4B13-8348-66D769DDF5E2" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CLSID\
\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\VeriSign LDAP Server ID = "2" HKEY_CURRENT_USER
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
"Apartment" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ Wow6432Node\CLSID\{{GUID}}\ ToolboxBitmap32 (Default) = "%System%\mshtmled.dll, 1" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ Wow6432Node\CLSID\{{GUID}}\ MiscStatus
"Apartment" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ Wow6432Node\CLSID\{{GUID}}\ ToolboxBitmap32 (Default) = "%System%\mshtmled.dll, 1" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ Wow6432Node\CLSID\{{GUID}}\ MiscStatus
EnableLUA = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusOverride = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center AntiVirusDisableNotify = "1" HKEY_LOCAL_MACHINE\SOFTWARE
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
\Uninstall.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ vlc 1.00 NoModify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ vlc 1.00 NoRepair = "1
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Eventlog\Application\ ESENT CategoryCount = "1" (Note: The default value data of the said registry entry is 10 .) HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services
{e44a1809-4d10-4ab8-b343-3326b64c7cdd}" HKEY_CURRENT_USER\Software\Conduit\ ISM\IE _COUNTRY_CODE_ = "US" HKEY_CURRENT_USER\Software\Conduit\ ISM\IE _CRE_MODE_ = "1" HKEY_CURRENT_USER\Software\Conduit\ ISM\IE
\SYSTEM\CurrentControlSet\ Control\Lsa LimitBlankPasswordUse = "0" (Note: The default value data of the said registry entry is 1 .) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\Terminal Server
CVE-2010-1813 WebKit in Apple iOS before 4.1 on the iPhone and iPod touch allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via
dir /a "%ProgramFiles%" & dir /a "%ProgramFiles(x86)%" & echo *** & "%AppDataLocal%\Programs\Adobe\HistoryView.exe" /nosort /SaveDirect /HistorySource 1 /LoadIE 1 /LoadFirefox 1 /LoadChrome 1
\downloader 1.2 DisplayVersion = "1.2" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ Microsoft\Windows\CurrentVersion\ Uninstall\downloader 1.2 VersionMajor = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ Microsoft
" HKEY_CURRENT_USER\Software\WinRAR\ Setup\.rar Set = "1" HKEY_CURRENT_USER\Software\WinRAR\ Setup\.zip Set = "1" HKEY_CURRENT_USER\Software\WinRAR\ Setup\.cab Set = "1" HKEY_CURRENT_USER\Software\WinRAR\ Setup\.arj