Search
Keyword: unixliona1
stdrtd.exe = "0" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings CertificateRevocation = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings
\Accounts\Active Directory GC LDAP Server ID = "0" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account
" HKEY_CURRENT_USER\Software\Solvusoft\ Solvusoftdd\DriverDoc StartAutoScanPMUI = "1" HKEY_CURRENT_USER\Software\Solvusoft\ Solvusoftdd\DriverDoc StartAutoScanOnLaunch = "0" HKEY_CURRENT_USER\Software\Solvusoft
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping
"109139122142134090" HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ NetworkAgentDriver t0_deb = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ NetworkAgentDriver t0_sp = "092083117112098103093104112108117140146140141126134076075117
CVE-2008-2801 Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly implement JAR signing, which allows remote attackers to execute arbitrary code via (1) injection of
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
DisplayVersion = "1.0.0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ diamondata VersionMajor = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ diamondata
"2A0256E72B2462A8B68DAAD25D" HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ NetworkAgentDriver t0_s = "109139122142134090" HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ NetworkAgentDriver t0_deb = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Clients
\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\3 2300 = "0" (Note: The default value data of the said registry entry is 1 .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet
HKEY_CURRENT_USER\Software\Super Optimizer SessionID = "9B920803-D300-4ECF-B33C-EFAC82139FFB" HKEY_CURRENT_USER\Software\Super Optimizer cufValue = "CUF=0" HKEY_CURRENT_USER\Software\Super Optimizer Language = "1
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping
\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping Routine This Trojan drops the following files: %System Root%\8604fbe6\8604fbe6.exe %User Profile%\Application Data\8604fbe6.exe
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping
\Wilbert914\ 1926745233 It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UacDisableNotify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center\Svc
\ Browser Helper Objects\{104B646A-123B-462B-995B-5A763706E2C9} NoExplorer = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Ext\CLSID {104B646A-123B-462B-995B-5A763706E2C9} = "1