Keyword: unixliona1
54359 Total Search   |   Showing Results : 1801 - 1820
This malware disguises itself as FIFA 14-CrackV5. A World Cup-related search can lead users to a supposed key generator for the game FIFA 14. To get a one-glance comprehensive view of the behavior of
characters}" HKEY_CURRENT_USER\Software\qanz zojewbdazo = "{random characters}" HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Windows\WindowsUpdate DisableOSUpgrade = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Policies
{random characters}" HKEY_CURRENT_USER\Software\qanz zojewbdazo = "{random characters}" HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Windows\WindowsUpdate DisableOSUpgrade = "1" HKEY_LOCAL_MACHINE
characters}" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 Sequence = "1" HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 RegFiles0000 = "\x00" HKEY_CURRENT_USER\Software
\Microsoft\ Active Setup\Installed Components\{4413F662-6095-4C7C-9A2F-41A33CD33BA1} IsInstalled = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\
CVE-2013-1861 MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows
Identity Ordinal = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts AssociatedID = "{random values}" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Active
Account Manager\Accounts\Bigfoot LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\VeriSign LDAP Server ID = "2" HKEY_CURRENT_USER\Software\Microsoft\ Internet
\Accounts\Active Directory GC LDAP Server ID = "0" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
\Software\Microsoft\ Internet Account Manager\Accounts\Active Directory GC LDAP Server ID = "0" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP Server ID = "1
= "0" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\VeriSign LDAP Server
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\StandardProfile DisableNotifications = "1" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\SharedAccess\Parameters\ FirewallPolicy\StandardProfile\GloballyOpenPorts\ List 5975:UDP = "5975:UDP:*:Enabled:UDP 5975
adds the following registry entries: HKEY_CURRENT_USER\Software\Policies\ Microsoft\Windows\System DisableCMD = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main Window Title =
\ControlSet001\ Services\SharedAccess\Parameters\ FirewallPolicy\StandardProfile DisableNotifications = "1" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\SharedAccess\Parameters\ FirewallPolicy\StandardProfile
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CLSID\HOOK_ID name = "7bf6.exe" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\421d1a02 Type = "1" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\421d1a02 ErrorControl = "1
DisableNotifications = "1" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\SharedAccess\Parameters\ FirewallPolicy\StandardProfile\GloballyOpenPorts\ List 5455:UDP = "5455:UDP:*:Enabled:UDP 5455" HKEY_LOCAL_MACHINE
Identity Ordinal = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts AssociatedID = "{random values}" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Active
QuietUninstallString = "%Program Files%\Transcend\Recovery Tool\unins000.exe /SILENT" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ Transcend Recovery_is1 NoModify = "1" HKEY_LOCAL_MACHINE