Keyword: os2first
41783 Total Search   |   Showing Results : 1261 - 1280
the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\googleupdate Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\googleupdate ImagePath = "%Windows%\
A vulnerability in the default installation of Apache HTTP Server could allow a remote attacker to traverse directories on the Web server and view and execute files. A remote attacker could create a
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any
=download https://{BLOCKED}oogle.com/uc?authuser=0&id={BLOCKED}vVBYyB-qfHa-hc9nPdlWq9JsId&export=download Information Theft This Trojan Spy gathers the following data: From the infected machine: OS version OS
This malware abuses certificates and has security software evasion that affects machines using Apple's OS X operating system. The fake certificates installed by the malware allows for man in the
}nwind.xyz/get/ Rootkit Capabilities This Backdoor does not have rootkit capabilities. Information Theft This Backdoor gathers the following data: Volume Serial Number MAC Address OS Version System Type (32bit or
or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.) As of this writing, the said sites are inaccessible. Information Theft This Trojan gathers the following data: MAC Address OS Version
cookies System information IP Address DNS Name Hostname User Name Domain User Privilege OS version Network Interfaces (address, netmask and status) Software installed FTP, POP3, IMAP, SMTP, HTTPMail, NNTP
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Proxy address for the Man-in-the-middle attack List of strings related to banking/bitcoin It gathers the following data: Computer Name Host Name Public IP Address OS Version User Name OS platform
Proxy address for the Man-in-the-middle attack List of strings related to banking/bitcoin It gathers the following data: Computer Name Host Name Public IP Address OS Version User Name OS platform
\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced Hidden = 2 (Note: The default value data of the said registry entry is 1 .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer
333333 33333 3333 333 33 3 22222222 2222222 222222 22222 2222 222 22 2 11111111 1111111 111111 11111 1111 111 11 1 00000000 0000000 00000 0000 000 00 0987654321 987654321 87654321 7654321 654321 54321 4321
333333 33333 3333 333 33 3 22222222 2222222 222222 22222 2222 222 22 2 11111111 1111111 111111 11111 1111 111 11 1 00000000 0000000 00000 0000 000 00 0987654321 987654321 87654321 7654321 654321 54321 4321
KLOVBOT is a malware family of spyware capable of stealing information such as affected system’s host name and OS version. It then sends the stolen information to its command-and-control (C&C)