Keyword: os2first
41783 Total Search   |   Showing Results : 1401 - 1420
system. The said .INF file contains the following strings: [AutoRun] open=Recycled.exe shell\1=´ò¿ª(&O) shell\1\Command=Recycled.exe shell\2\=ä¯ÀÀ(&B) shell\2\Command=Recycled.exe shellexecute=Recycled.exe
This Trojan may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the
affected system: Host Name OS Version Stolen Information This spyware sends the gathered information via HTTP POST to the following URL: http://{BLOCKED}enezuela2.co.cc/priv8/bots.php?name={Host Name}&so={OS
This spyware may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It also has rootkit capabilities,
This spyware is a variant of the info-stealing ZBOT/ZeuS malware family that aims to defeat the two-factor security authentication of banks using a ZeuS mobile malware, such as WINCE_ZBOT.B, to steal
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
Server 2008, and Windows Server 2012.) Information Theft This Trojan gathers the following data: Computer Name OS version Service Pack Other Details This Trojan connects to the following URL(s) to get the
information: Computer name OS information OS product type Build no. of the system System information(processor type, no of processors, page size, architecture) Network information (adapters) Processor / Hardware
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This is the Trend Micro detection for Trojanized apps that belong to the Wirelurker malware family. This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Trojan employs registry shell spawning by adding certain registry entries. This allows this malware to execute even when other applications are opened. It modifies Internet Explorer security
7.) Other Details This backdoor gathers the following information and reports it to its servers: Local IP Mac Address Size of RAM Country OS Name OS Version If User is Admin Java Version NOTES: This
vulnerability in certain versions of Adobe Flash Player. It takes advantage of the following vulnerability: CVE-2013-0633 The exploit is triggered in Windows OS and in specific versions of Adobe Flash Player. It
CVE-2010-1778 Cross-site scripting (XSS) vulnerability in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to inject
CVE-2010-1784 The counters functionality in the Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac
CVE-2010-1396 Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute