Search
Keyword: Coinminer_MALXMR.SMGH2-ELF64
System Modifications This Adware adds the following registry entries: HKEY_CURRENT_USER\Software\Babylon\ Babylon Translator\Users\Default\ Options TranslateWithShift = 2 HKEY_CURRENT_USER\Software\Babylon
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Adware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
(MS14-019) Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2922229)
Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012 (Server Core installation),Windows Server 2012 R2 (Server
(MS13-083) Vulnerability in Windows Common Control Library Could Allow Remote Code Execution (2864058)
Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core
Systems,Windows Server 2012 R2,Windows RT,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
(MS13-053) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2850851)
1,Windows Server 2008 R2 for Itanium-based Systems Service Pack 1,Windows 8 for 32-bit Systems,Windows 8 for 64-bit Systems,Windows Server 2012,Windows RT,Windows Server 2008 for 32-bit Systems Service Pack 2
Server 2012,Windows RT,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server
Systems,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
for Itanium-based Systems Service Pack 1,Windows 8 for 32-bit Systems,Windows 8 for 64-bit Systems,Windows Server 2012,Windows RT,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled
= "2" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\WhoWhere LDAP Server ID = "3" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager Server ID = "4
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\cAdobe_ChainBuilder\cAcceptablePolicyOIDs\ c1 iEnd = "2" HKEY_CURRENT_USER\Software\Adobe\ Acrobat Reader\10.0\Security\ cASPKI\cASPKI\cCustomCertPrefs\ c312E322E3834302E3131343032312E310000\cAdobe_ChainBuilder
\cAdobe_ChainBuilder\cAcceptablePolicyOIDs\ c1 iEnd = "2" HKEY_CURRENT_USER\Software\Adobe\ Acrobat Reader\10.0\Security\ cASPKI\cASPKI\cCustomCertPrefs\ c312E322E3834302E3131343032312E310000\cAdobe_ChainBuilder
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\VeriSign LDAP Server ID = "2" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\WhoWhere