Search
Keyword: os2
\smtmp\1 %User Temp%\smtmp\2 %User Temp%\smtmp\3 %User Temp%\smtmp\4 %Start Menu%\Programs\{OS Name} Restore (Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings
characters}.tmp\{random characters}.bat "{Malware file path}\{Malware file name}"" %System%\cmd.exe /c wmic os get Caption wmic os get Caption %System%\cmd.exe /c wmic os get CSDversion wmic os get CSDversion
CVE-2010-0519 Integer overflow in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a FlashPix image
CVE-2010-0520 Heap-based buffer overflow in QuickTimeAuthoring.qtx in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities.
CVE-2009-0010 Integer underflow in QuickDraw Manager in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7, and Apple QuickTime before 7.6.2, allows remote attackers to execute arbitrary code or cause a
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities.
}in.com/raw/3fS0MSjN → blacklisted.txt Information Theft This Trojan Spy gathers the following data: Username Computer name IP address Hard Drive Information: Total size Available Space Free Space OS Name OS
following data: Username Computer name IP address Hard Drive Information: Total size Available Space Free Space OS Name OS Architecture OS Platform OS Machine OS Processor Program Runtime of the malware User
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following files: %Desktop%\Optimizer Pro.lnk
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run {String 1} {String 3} = %Program Files%\{String 1} {String 3}\{String 1}{String 2}.exe -> Admin privilege 32-bit OS HKEY_LOCAL_MACHINE\SOFTWARE
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
--Target {Target OS Machine} --ShellcodeFile Shellcode.ini --PipeName browser --CredChoice 0 --InConfig svchostromance.xml&&serverlong.exe --OutConfig {Target IP}-dll.txt --TargetIp {Target IP} --TargetPort
information: OS information (Architecture, Caption, CSDVersion) CPU Information (Name) Memory Information User Accounts Installed Programs Installed Services IP Configuration Network Information (Configuration,
Information regarding Point-Of-Sale (POS) systems in the network, by querying accounts or user name containing the following string: *POS* *REG* *CASH* *LANE* *STORE* *RETAIL* *BOH* *ALOHA* *MICROS* *TERM* OS
composed of the following: Available Physical Memory BIOS Version Boot Device Domain Host Name Hotfix(s) Input Locale Logon Server NetWork Card(s) Original Install Date OS Build Type OS Configuration OS