Keyword: unixliona1
54359 Total Search   |   Showing Results : 1161 - 1180
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Adware adds the following processes: cmd.exe /c ping 1.1.1.1 -n 1 -w 5000 > Nul
\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{098716A9-0310-4CBE-BD64-B790A9761158} NoExplorer = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ Interface\{A1C23BA2-8F20-4C01-B663-7FF2B3421194}\TypeLib
This malware family of Trojans is used to download other malware on the affected systems thus further compromising its security. Installation This worm drops the following copies of itself into the
This malware family of Trojans is used to download other malware on the affected systems thus further compromising its security. Installation This Trojan drops the following copies of itself into the
\Software\Microsoft\ MessengerService FirstTimeUser = "0" HKEY_CURRENT_USER\Software\Microsoft\ MessengerService UsedGroupsView = "1" Dropping Routine This worm drops the following files: %System Root%
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
\FCTB000060231 It adds the following registry entries: HKEY_CURRENT_USER\Software\AppDataLow\ AWGAMECONFIG autoupd = "1" HKEY_CURRENT_USER\Software\AppDataLow\ AWGAMECONFIG snoozetime = "{random values}
Account Manager\Accounts\Bigfoot LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\VeriSign LDAP Server ID = "2" HKEY_CURRENT_USER\Software\Microsoft\ Internet
This malware family of Trojans is used to download other malware on the affected systems thus further compromising its security. Installation This Trojan drops the following copies of itself into the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\E899182226C950C7C83B138296AAA887 weblink = "{random values}" HKEY_CURRENT_USER\Software\E899182226C950C7C83B138296AAA887 pub = "{random values}" HKEY_CURRENT_USER\Software\E899182226C950C7C83B138296AAA887 start = "1
\ Microsoft\Windows\WindowsUpdate DisableOSUpgrade = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Windows\WindowsUpdate\ OSUpgrade ReservationsAllowed = "0" HKEY_LOCAL_MACHINE\SOFTWARE\qanz ltpxeirzlt =
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping
= "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\International\CpMRU Size = "a" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\International\CpMRU InitHits = "64
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
= "0" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\VeriSign LDAP Server