Keyword: os2first
41783 Total Search   |   Showing Results : 921 - 940
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
and executes the DLL specified in its first parameter. Adware-TCent.gen.ab (McAfee)
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This AutoLisp Script is executed once an AutoCAD drawing file is opened. It first searches
This Trojan exploits a zero-day vulnerability (CVE-2011-2462) that is believed to target the defense industry. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the
}.exe Process Termination This Trojan terminates the following processes if found running in the affected system's memory: taskmgr.exe NOTES: At first execution, the malware will restart the affected
MUMA is a family of worms that spreads via network shares. It propagates by penetrating systems with weak administrator passwords and copying its program to vulnerable systems. In addition, it also
prompted Microsoft to issue an out-of-band patch days after its first variant came out. In later investigations, STUXNET was revealed to be targeting computers controlling critical infrastructures known as
MUMA is a family of worms that spreads via network shares. It propagates by penetrating systems with weak administrator passwords and copying its program to vulnerable systems. In addition, it also
Trend Micro spotted the first OSCARBOT malware in 2007, spreading via the ASN.1 Bitstring Overflow vulnerability found in Windows NT, 2000, and XP systems. Other OSCARBOT malware propagates using any
LDPINCH malware are comprised of worms and Trojans noted for its information stealing routine. First strains of this malware family appeared in 2007. Its variants are known to be downloaded from
dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: It is an AutoCAD LISP script that spreads by copying itself to AutoCAD's working folder. If first
First spotted in 2006, NUWAR malware spread across systems via mass mailing copies of itself as an attachment. Its worm variants contain its own Simple Mail Transfer Protocol (SMTP) engine to send
LDPINCH malware are comprised of worms and Trojans noted for its information stealing routine. First strains of this malware family appeared in 2007. Its variants are known to be downloaded from
prompted Microsoft to issue an out-of-band patch days after its first variant came out. In later investigations, STUXNET was revealed to be targeting computers controlling critical infrastructures known as
operations, to the exposure of personal or confidential data. Malware encompasses computer viruses, Trojans, worms, spyware, backdoors, and other malicious software. Historically, the first forms of malware
First spotted in 2006, NUWAR malware spread across systems via mass mailing copies of itself as an attachment. Its worm variants contain its own Simple Mail Transfer Protocol (SMTP) engine to send
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_ARTIEF.LOG Installation This Trojan drops the following component file(s): %User
\ Explorer\Run RTHDBPL = "%User Profile%\SysWin\lsass.exe" HKEY_CURRENT_USER\Identities KillSelf = "ok" HKEY_CURRENT_USER\Identities Curr version = "35" HKEY_CURRENT_USER\Identities First Start = "%System%
AMBLER variants were first seen in the wild in 2009. It is a family of Trojans, spyware, and worms that are designed to steal sensitive information from users. Some of the information it steals are
AMBLER variants were first seen in the wild in 2009. It is a family of Trojans, spyware, and worms that are designed to steal sensitive information from users. Some of the information it steals are