Search
Keyword: os2
gathers the following information and reports it to its servers: Language of affected system number of failed encrypted files number of encrypted files OS architecture (if 64bit) victim ID NOTES: This
information and reports it to its servers: Language of affected system number of failed encrypted files number of encrypted files OS architecture (if 64bit) victim ID NOTES: This malware prevents to encrypt
Language of affected system number of failed encrypted files number of encrypted files OS architecture (if 64bit) victim ID NOTES: This ransomware encrypts files in fixed, removable, RAM disk drives, and
This backdoor gathers the following information and reports it to its servers: Local IP Mac Address Size of RAM Country OS Name OS Version If User is Admin Java Version Trojan:Java/Adwind (Microsoft);
\googleupdate Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\googleupdate ImagePath = "%Windows%\{random file name}.exe" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\googleupdate
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
smtp.sbcglobal.yahoo.com smtp.mail.yahoo.com smtp.live.com Backdoor Routine This backdoor executes the following commands from a remote malicious user: Download and execute files Retrieve Spam Configuration/Content Get OS
This spyware may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
=e9e45de07d328e8d46adf4357840be5e&floor{random}&uid={value}&out={process id of executed downloaded file}&ver={version number} It displays the following message boxes: It does the following: Enumerates running processes Gets OS version
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\VeriSign LDAP Server ID = "2" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\WhoWhere
LDAP Server ID = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\VeriSign LDAP Server ID = "2" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\WhoWhere
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. Arrival