Search
Keyword: unixliona1
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
\ Browser Helper Objects\{80204885-BEFD-41DF-B64D-2AE57CCCAF56} NoExplorer = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Ext\CLSID {80204885-BEFD-41DF-B64D-2AE57CCCAF56} = "1
t0_s = "109139122142134090" HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ NetworkAgentDriver t0_deb = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ NetworkAgentDriver t0_sp =
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
\ Internet Account Manager\Accounts\Bigfoot LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\VeriSign LDAP Server ID = "2" HKEY_CURRENT_USER\Software\Microsoft
CVE-2008-2803 The mozIJSSubScriptLoader.LoadScript function in Mozilla Firefox before 2.0.0.15, Thunderbird 2.0.0.14 and earlier, and SeaMonkey before 1.1.10 does not apply XPCNativeWrappers to
CVE-2010-3747 An ActiveX control in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.4, and RealPlayer Enterprise 2.1.2 does not properly initialize an unspecified object
CVE-2010-0111 HDNLRSVC.EXE in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (aka AMS or AMS2), as used in Symantec AntiVirus Corporate Edition
system versions.) It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\{{GUID}} 1569844393 = "1" HKEY_LOCAL_MACHINE\SOFTWARE\WebDiscoverBrowser version = "4.28.2" HKEY_LOCAL_MACHINE\SOFTWARE
\Classes\ CLSID\{generated CLSID ID-2}\MiscStatus Default = 0 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CLSID\{generated CLSID ID-2}\MiscStatus\ 1 Default = 131473 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CLSID\
\Session0000 Sequence = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ Falco\868 BundleOfferActionUid = "n7rBuIo842fpKKFV255555" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 RegFiles0000 =
}" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 Sequence = "1" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 RegFiles0000 = "\x00" HKEY_CURRENT_USER\Software
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\ RestartManager\Session0000 Sequence = "1" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 RegFiles0000 = "\x00" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 RegFilesHash = "
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\Tcpip\Parameters AllowUnqualifiedQuery = "0" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip\Parameters PrioritizeRecordData = "1" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Tcpip
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies\ system EnableLUA = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UACDisableNotify = "1" Dropping Routine This Trojan drops the following