Keyword: unixliona1
54359 Total Search   |   Showing Results : 1641 - 1660
00" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ services\bd0001 Type = "1" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ services\bd0001 Start = "1" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ services\bd0001
HKEY_CURRENT_USER\Software\DT Soft\ DAEMON Tools Pro\View Language = 1033 HKEY_CURRENT_USER\Software\DT Soft\ DAEMON Tools Pro\Config Autostart = 1 HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run
qwer12345 Huawei@123 123@abc golden 123!@#qwe 1qaz@WSX Ab123 1qaz!QAZ Admin123 Administrator Abc123 Admin@123 999999 Passw0rd 123qwe!@# football welcome 1 12 21 123 321 1234 12345 123123 123321 111111 654321
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping
QuietUninstallString = "%Program Files%\PPC-software\uninst.exe /S" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ PPC-software NoModify = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
CVE-2009-2957 Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long
CVE-2007-0851 Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\{UID 1} n = "1" HKEY_LOCAL_MACHINE\SOFTWARE\{UID 1} {random numbers 1} = "%Program Files%\IncrementGeneration\IncrementGeneration.dll" HKEY_LOCAL_MACHINE
" HKEY_CURRENT_USER\Software\Super Optimizer BuyNowURL = "http://gen.securedshopgate.com/?{value}" HKEY_CURRENT_USER\Software\Super Optimizer CBM = "1" HKEY_CURRENT_USER\Software\Super Optimizer DelayedStart = "5
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping
%User Profile%\Cookies\wilbert@www.msn[1].txt = "68adfd" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\SystemRestore DisableSR = "1" Dropping
" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager Server ID = "4" HKEY_CURRENT_USER\Software\Microsoft\ WAB\WAB4 FirstRun = "1" HKEY_CURRENT_USER\Software\Microsoft\ WAB\WAB4 OlkContactRefresh = "0
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\Secure PC Cleaner TELNOFR = "01.76.54.27.59" HKEY_LOCAL_MACHINE\SOFTWARE\Secure PC Cleaner ShowExitPage = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Jawego\ Params SPCC = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Secure PC
LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\VeriSign LDAP Server ID = "2" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\WhoWhere
7.0 installed),Windows 7 for 32-bit Systems Service Pack 1,Windows 7 for x64-based Systems Service Pack 1 (with Remote Desktop Client 8.1 installed),Windows Server 2008 R2 for x64-based Systems Service