home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
PC World Komputer 2010 April
/
PCWorld0410.iso
/
hity wydania
/
PC Tools ThreatFire
/
tfinstall.exe
/
{app}
/
TFCRW.dll
/
string.txt
< prev
next >
Wrap
Text File
|
2010-01-14
|
4KB
|
107 lines
1 &OK
2 &Cancel
114 tries to <access|TriggerAccessFlags> a file
115 tries to <access|TriggerAccessFlags> <x|TriggerCount> files
116 tries to rename a file
117 creates files on <x|TriggerCount> different machines
118 deletes and recreates an existing file
119 creates and then executes a file
120 tries to copy itself
121 tries to write to the ini file <file|TriggerIniFiles>
122 tries to write to the registry
123 tries to call <the API Function|TriggerFunctions> in <the DLL|TriggerDllFiles>
124 tries to write to the address space of another running process
125 tries to create a thread in the address space of another running process
126 monitors key strokes
127 creates a COM object
128 tries to send a HTTP request
129 performs a HTTP download
130 creates <x|TriggerCount> network connections
131 listens for network connections
132 sends <x|TriggerCount> pings
133 downloads an email containing a suspicious link
134 named <file name|TriggerFiles>
135 in <the folder|TriggerFolders>
136 that looks like an executable
137 containing executable code
138 with a suspicious double extension
139 within <y|TriggerSeconds> seconds
140 from <file name|TriggerFiles>
141 to <file name|TriggerFiles2>
142 so it has a suspicious double extension
143 having <file name|TriggerFiles>
144 within <x|TriggerSeconds> seconds
145 to <the section|TriggerKeys>
146 to <the value|TriggerValues>
147 to <the key|TriggerKeys>
148 with <guid|TriggerGuids>
149 with a URL longer than <x|TriggerLength> bytes
150 with a header longer than <y|TriggerLength2> bytes
151 to <the domain or IP|TriggerDomains>
152 retrieving <the file|TriggerFiles>
153 retrieving a file of type <content type|TriggerMimeTypes>
154 from the <domain or IP|TriggerDomains>
155 on port <number|TriggerPorts>
156 to the same domain or IP
157 kill the source process
158 inform the local user
159 write event to the system log
160 send an administarative alert
161 prevent the file access
162 prevent the file rename
163 prevent the copy
164 prevent the file write
165 prevent the registry write
166 prevent the memory write
167 prevent the thread creation
168 prevent the object creation
169 block the request
170 disable the link
171 prevent the connection
172 prevent the listen
173 no options available
174 Error
175 read
176 write
177 delete
178 create
179 execute
180 INI Files (*.ini)
181 DLL Files (*.dll)
182 All Files (*.*)
183 When
184 or
185 then
186 When any process
187 When any non-interactive process
188 When an email program or web browser
189 process list
190 Functions
191 You must click on the underlined items and configure them before continuing
192 and
193 the source process is in the system process list
194 the source process is in the trusted process list
195 the source process is <process list|ExcludedProcesses>
196 the target file is <file name|ExcludedFiles>
197 the target file is in <the folder|ExcludedFolders>
198 the target files are <file names|ExcludedFiles>
199 the target files are in <the folder|ExcludedFolders>
200 the target file is originally named <file name|ExcludedFiles>
201 the target file is renamed to <file name|ExcludedFiles>
202 the target ini file is <file name|ExcludedFiles>
203 the target ini section is <section name|ExcludedKeys>
204 the target value is <value name|ExcludedValues>
205 the target registry key is <registry key|ExcludedKeys>
206 the downloaded file is <file name|ExcludedFiles>
207 the downloaded file type is <content type|ExcludedMimeTypes>
208 the port is <number|ExcludedPorts>
209 except when
210 delete the file
211 Registry Keys
212 Registry Values
213 Domains or IP Addresses
214 Ports
12323 &Back
12324 &Next
12325 &Finish