Search
Keyword: os2first
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
CVE-2008-4609,MS09-048 The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to
CVE-2009-1692 WebKit before r41741, as used in Apple iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Safari, and other software, allows remote attackers to cause a denial of
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
\iColorFolder\iColorFolder.exe %Program Files%\iColorFolder\skins\Mac OS X\iColorFolder.dll %Program Files%\iColorFolder\skins\Mac OS X\preview.png %Program Files%\iColorFolder\skins\WindowsXP\iColorFolder.dll
Powershell-Enabled}" + "')" + '"" It adds the following mutexes to ensure that only one of its copies runs at any one time: Global\powerv5 Information Theft This Trojan gathers the following data: OS Version MAC
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
HKEY_CURRENT_USER\oS HKEY_CURRENT_USER\oS\DefaultIcon HKEY_CURRENT_USER\oS\shell HKEY_CURRENT_USER\oS\shell\ open HKEY_CURRENT_USER\oS\shell\ open\command HKEY_CURRENT_USER\oS\shell\ runas HKEY_CURRENT_USER\oS\shell
Information Theft This spyware gathers the following data: Host Name Public IP Address Computer Name OS Version OS Platform User Accounts System Info(CPU, Memory, No. of Processors) Installed programs Services
(32- and 64-bit), Windows Server 2008, and Windows Server 2012.) Information Theft This spyware gathers the following data: Host Name Public IP Address Computer Name OS Version OS Platform User Accounts
execute arbitrary code. Apple Mac OS X 10.2.2,Apple Mac OS X 10.2.3,Apple Mac OS X 10.2.4,Compaq Tru64 4.0b,Compaq Tru64 4.0d,Compaq Tru64 4.0d PK9 (BL17),Compaq Tru64 4.0f,Compaq Tru64 4.0f PK6 (BL17
registry entries: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\svflooje Type = 110 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\svflooje Start = 2 HKEY_LOCAL_MACHINE\SYSTEM
registry entries: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\svflooje Type = 110 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\svflooje Start = 2 HKEY_LOCAL_MACHINE\SYSTEM
64-bit), Windows Server 2008, and Windows Server 2012.) Information Theft This spyware gathers the following data: Host Name Public IP Address Computer Name OS Version OS Platform User Accounts System Info
Windows Server 2012.) Information Theft This spyware gathers the following data: Host Name Public IP Address Computer Name OS Version OS Platform User Accounts System Info(CPU, Memory, No. of Processors)
" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\ge DisplayName = "Google Update" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\ge Start = "2" It adds the following registry entries to enable its
\ Services\googleupdate Start = "2" It adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run