Search
Keyword: os2
=download https://{BLOCKED}oogle.com/uc?authuser=0&id={BLOCKED}vVBYyB-qfHa-hc9nPdlWq9JsId&export=download Information Theft This Trojan Spy gathers the following data: From the infected machine: OS version OS
or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.) As of this writing, the said sites are inaccessible. Information Theft This Trojan gathers the following data: MAC Address OS Version
This malware abuses certificates and has security software evasion that affects machines using Apple's OS X operating system. The fake certificates installed by the malware allows for man in the
cookies System information IP Address DNS Name Hostname User Name Domain User Privilege OS version Network Interfaces (address, netmask and status) Software installed FTP, POP3, IMAP, SMTP, HTTPMail, NNTP
}nwind.xyz/get/ Rootkit Capabilities This Backdoor does not have rootkit capabilities. Information Theft This Backdoor gathers the following data: Volume Serial Number MAC Address OS Version System Type (32bit or
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced Hidden = 2 (Note: The default value data of the said registry entry is 1 .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer
333333 33333 3333 333 33 3 22222222 2222222 222222 22222 2222 222 22 2 11111111 1111111 111111 11111 1111 111 11 1 00000000 0000000 00000 0000 000 00 0987654321 987654321 87654321 7654321 654321 54321 4321
333333 33333 3333 333 33 3 22222222 2222222 222222 22222 2222 222 22 2 11111111 1111111 111111 11111 1111 111 11 1 00000000 0000000 00000 0000 000 00 0987654321 987654321 87654321 7654321 654321 54321 4321
Proxy address for the Man-in-the-middle attack List of strings related to banking/bitcoin It gathers the following data: Computer Name Host Name Public IP Address OS Version User Name OS platform
Proxy address for the Man-in-the-middle attack List of strings related to banking/bitcoin It gathers the following data: Computer Name Host Name Public IP Address OS Version User Name OS platform
KLOVBOT is a malware family of spyware capable of stealing information such as affected system’s host name and OS version. It then sends the stolen information to its command-and-control (C&C)
company. Apple has credited Lin for his research contribution. All systems which run on Mac OS X below 10.11.2 (OS X El Capitan) and Intel Graphics Driver AppleIntelBDWGraphics can be affected by this
Despite being released in 2001, Windows XP remains a popular OS for users. According to reports, the OS still has around 30% of the user market share. In fact, additional data would suggest that the
\ Advanced Hidden = 2 (Note: The default value data of the said registry entry is 1 .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced ShowSuperHidden = 0 (Note: The default