Search
Keyword: os2
Internet Explorer Zone Settings. Other Details This backdoor gathers the following information and reports it to its servers: Local IP Mac Address Size of RAM Country OS Name OS Version If User is Admin Java
system's memory: notepad.exe chrome.exe firefox.exe Information Theft This spyware gathers the following data: keybordlogs clipboardlogs computername OS Version Default Browser Plugins Installed AV Other
CVE-2016-1718 This vulnerability affects OS X below 10.11.3. It occurs by sending two special requests to IOAcceleratorFamily2 module. As such, an array overflow happens in method
CVE-2014-8439,APSB14-26,APSB14-22 Adobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
following data: Hostname Username OS Version Service Configurations Other Details This Ransomware does the following: It uses wevtutil.exe to clear event logs of each segment of its malicious routine. Before
\CurrentControlSet\ Services\raswmi Type = "10" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\raswmi Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\raswmi ImagePath = "%SystemRoot%\System32
\CurrentControlSet\ Services\raswmi Type = "10" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\raswmi Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\raswmi ImagePath = "%SystemRoot%\System32
version and generated hash}&session={value}&v={value}&name={string}&mj={Major OS version}&mi={Minor OS version}&pt={OS product type}&b={OS build}&dc={32/64}&av={value} Other Details This spyware checks for
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware is involved in attacks which targeted specific banking corporations in Korea during November 2012. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It acts as a Browser Helper Object (BHO) that monitors
steal login credentials and money from bank accounts and manipulate the account page to display no changes in the account balance. It also gathers system information, such as IP Address, OS version,
This spyware may also use a purely random set of characters as its file name. It connects to certain servers to report system infection and send information such as OS version and IP address. This
email to a target system - Get OS name and version, system uptime, current process name, user ID, group ID and current directory cleartmp - Delete all files in /tmp rootable - Enumerates possible root
steal login credentials and money from bank accounts and manipulate the account page to display no changes in the account balance. It also gathers system information, such as IP Address, OS version,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
" It adds the following registry entries to disable the Task Manager: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System DisableTaskMgr = "2" Backdoor Routine This Backdoor
\Uninstall\ KeyFinder_is1 InstallDate = {yyyymmdd} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ KeyFinder_is1 MajorVersion = 2 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows