Search
Keyword: os2
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\googleupdate (for Windows XP and lower) Information Theft This spyware gathers the following data: Host Name Public IP Address OS Version User Name Computer Name
communicating with the remote host: Mozilla/1.22 (compatible; MSIE 10.0; Windows 3.1) Mozilla/4.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/5.0) Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:21.0)
\SYSTEM\CurrentControlSet\ Services\googleupdate (for Windows XP and lower) Information Theft This spyware gathers the following data: Host Name Public IP Address OS Version User Name Computer Name OS
\ services\Updater.Mail.Ru Type = 16 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\Updater.Mail.Ru Start = 2 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\Updater.Mail.Ru ErrorControl = 0
GERAL (also known as The Robot Dog) is used to terminate security-related applications in order to download and execute other malicious files. As a result, system security is compromised.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
GERAL (also known as The Robot Dog) is used to terminate security-related applications in order to download and execute other malicious files. As a result, system security is compromised.
GERAL (also known as The Robot Dog) is used to terminate security-related applications in order to download and execute other malicious files. As a result, system security is compromised.
GERAL (also known as The Robot Dog) is used to terminate security-related applications in order to download and execute other malicious files. As a result, system security is compromised.
\CurrentControlSet\ Services\googleupdate DisplayName = "Google Update Service" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\googleupdate Start = "2" It adds the following registry entries to enable its
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
CVE-2008-0960 SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC)
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
340d3099 = "///%" - Only in Windows XP and lower OS versions HKEY_LOCAL_MACHINE\SOFTWARE\SP Global 3f76698f = "{Malware path and filename}.dll" - Only in Windows XP and lower OS versions HKEY_LOCAL_MACHINE
startup by adding the following registry keys: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\googleupdate (XP and lower) Information Theft This spyware gathers the following data: User Name OS
CVE-2002-1337 Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\googleupdate (for Windows XP and lower) Information Theft This spyware gathers the following data: Host Name Public IP Address OS Version User Name Other Details
(for Windows XP and lower) Information Theft This spyware gathers the following data: Computer Name Public IP Address OS Version User Name OS platform Installed programs Other Details This spyware
Information Theft This spyware gathers the following data: Computer Name Public IP Address OS Version User Name OS platform Installed programs Other Details This spyware connects to the following URL(s) to