Search
Keyword: os2
involving HTML IMG elements. nvd: Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html 'WebKit CVE-ID: CVE-2010-0054 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS
with right-to-left (RTL) text directionality. Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000. CVE-ID: CVE-2010-0049 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11,
This adware may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
information: List of strings related to banking/bitcoin Proxy address for the Man-in-the-middle attack List of new C&C server It gathers the following data: Host Name Public IP Address Computer Name OS Version
This malware is the final payload to the recent BlackEnergy targeted attacks that affected industries in Ukraine. The threat actors behind this attack normally use Excel files as part of their social
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
Information Theft This Ransomware gathers the following data: Username Computer Name Network System Language Machine Keyboard Layout OS Version and Platform AV products installed Processor IP Address Network
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
servers are successful) It gathers the following data: Computer Name Host Name Public IP Address OS Version User Name OS platform Installed programs Other Details This spyware connects to the following URL
OS Version Country Code Default Browser Machine Environment MAC Address User Account Information NOTES: However, as of this analysis, it does not complete its routine due to an error, wherein it
= x64 lv - running malware 0 = 1.exe 1 = kndt.exe os - OS version, value can be the following: 1 or 2 = Windows 10, Windows 8,Windows Server 2016, Windows Server 2012 3 or 4 = Windows 8.1, Windows
Theft This Ransomware gathers the following data: Mother Board Code ZIP Password Machine Name OS Full Name OS Version: Version String OS Version: Service Pack OS Platform OS Version Total Physical Memory
%ks /F /Create /TN "GO" /sc minute /MO 2 /ST 06:21 /TR "pow%tmp:~5,3%hell -ep bypass -%os:~0,3% 1 -c '&{cd %User Profile%; $g=F%os:~1,3%STR /S FOREGROUND agos*.* |%os:~6,1%elect -first 1;$g |iex}'";
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced Hidden = "2" (Note: The default value data of the said registry entry is 1 .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
of new C&C server It gathers the following data: Host Name Public IP Address Computer Name OS Version OS Platform User Accounts System Info(CPU, Memory, No. of Processors) Installed programs Services
}.77.109/timetable/ballet?bigleti=42007347811 As of this writing, the said sites are inaccessible. Information Theft This spyware gathers the following data: OS Version Computer Name User Name Running process Other Details