Search
Keyword: os2first
\ services\Updater.Mail.Ru Type = 16 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\Updater.Mail.Ru Start = 2 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\Updater.Mail.Ru ErrorControl = 0
GERAL (also known as The Robot Dog) is used to terminate security-related applications in order to download and execute other malicious files. As a result, system security is compromised.
GERAL (also known as The Robot Dog) is used to terminate security-related applications in order to download and execute other malicious files. As a result, system security is compromised.
GERAL (also known as The Robot Dog) is used to terminate security-related applications in order to download and execute other malicious files. As a result, system security is compromised.
GERAL (also known as The Robot Dog) is used to terminate security-related applications in order to download and execute other malicious files. As a result, system security is compromised.
\CurrentControlSet\ Services\googleupdate DisplayName = "Google Update Service" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\googleupdate Start = "2" It adds the following registry entries to enable its
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
340d3099 = "///%" - Only in Windows XP and lower OS versions HKEY_LOCAL_MACHINE\SOFTWARE\SP Global 3f76698f = "{Malware path and filename}.dll" - Only in Windows XP and lower OS versions HKEY_LOCAL_MACHINE
startup by adding the following registry keys: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\googleupdate (XP and lower) Information Theft This spyware gathers the following data: User Name OS
CVE-2002-1337 Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\googleupdate (for Windows XP and lower) Information Theft This spyware gathers the following data: Host Name Public IP Address OS Version User Name Other Details
(for Windows XP and lower) Information Theft This spyware gathers the following data: Computer Name Public IP Address OS Version User Name OS platform Installed programs Other Details This spyware
Information Theft This spyware gathers the following data: Computer Name Public IP Address OS Version User Name OS platform Installed programs Other Details This spyware connects to the following URL(s) to
\smtmp\1 %User Temp%\smtmp\2 %User Temp%\smtmp\3 %User Temp%\smtmp\4 %Start Menu%\Programs\{OS Name} Restore (Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings
characters}.tmp\{random characters}.bat "{Malware file path}\{Malware file name}"" %System%\cmd.exe /c wmic os get Caption wmic os get Caption %System%\cmd.exe /c wmic os get CSDversion wmic os get CSDversion
CVE-2010-0519 Integer overflow in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a FlashPix image
CVE-2010-0520 Heap-based buffer overflow in QuickTimeAuthoring.qtx in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder