Search
Keyword: unixliona1
= "{random values}" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts
\A8011EFBF78C61C89E3DB7FCE3BC6900 weblink = "{random values}" HKEY_CURRENT_USER\Software\A8011EFBF78C61C89E3DB7FCE3BC6900 pub = "{random values}" HKEY_CURRENT_USER\Software\A8011EFBF78C61C89E3DB7FCE3BC6900 start = "1
LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\VeriSign LDAP Server ID = "2" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\WhoWhere
This Spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Spyware arrives on a system as a
Double free vulnerability in Adobe Flash Player before 13.0.0.264 and 14.x through 16.x before 16.0.0.296 on Windows and before 11.2.202.440 on Linux allows attackers to execute arbitrary code via
Double free vulnerability in Adobe Flash Player before 13.0.0.264 and 14.x through 16.x before 16.0.0.296 on Windows and before 11.2.202.440 on Linux allows attackers to execute arbitrary code via
CVE-2013-1017 Buffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted dref atoms in a movie
CVE-2003-0201 Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to
CVE-2010-4389 Heap-based buffer overflow in the cook codec in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and Linux RealPlayer 11.0.2.1744 allows remote attackers to
CVE-2010-0110 Multiple stack-based buffer overflows in Intel Alert Management System (aka AMS or AMS2), as used in Symantec AntiVirus Corporate Edition (SAVCE) 10.x before 10.1 MR10, Symantec System
\Session0000 SessionHash = "k),\xc5\x1b\xf9\xca\x87\xe2v0\xc5UF[.\xe85\xffl\xf4\xb5\xb9\xb1AHV\xdb\xc1\xfbc" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 Sequence = "1" HKEY_CURRENT_USER
SfxInstProgress = "100" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\partmgr EnableCounterForIoctl = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Avast Software\ Avast SetupLog = "%All Users Profile%\Avast Software
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
\Software\Microsoft\ RestartManager\Session0000 Sequence = "1" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 RegFiles0000 = "\x00\x00\x00mP\xef\xab\x89E\xe5\x90\x90\xe6\xb0\x80\x0b\xe1\x80
" Other System Modifications This Ransomware adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion SysHelper = "1" Dropping Routine This Ransomware drops the
\x01" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 SessionHash = "{random characters}" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 Sequence = "1
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any backdoor routine. It takes
\Software\Microsoft\ RestartManager\Session0000 SessionHash = "{random characters}" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 Sequence = "1" HKEY_CURRENT_USER\Software\Microsoft
This Others arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Others arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a