Search
Keyword: os2
\CurrentControlSet\ Services\googleupdate (for Windows XP and lower) Information Theft This spyware gathers the following data: Host Name Public IP Address OS Version User Name Other Details This spyware connects to
Settings\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local on Windows Vista and 7.) Information Theft This backdoor gathers the following data: OS version Build
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\netmanlr Start = "2" It adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
malware/grayware or malicious users. NOTES: Once the malicous document is opened, the macro which contains the malware code executes and drops the following files: For OS Verion XP and below: %Temp%
NOTES: Once the malicous document is opened, the macro which contains the malware code executes and drops the following files: For OS versions XP and below: %Temp%\adobeacd-update.bat %Temp%
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\iis Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\iis ImagePath = "%Windows%\IIS\srvany.exe" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
Windows operating system versions.) It gathers the following information and reports it to its servers: MAC Address IP Address Computer name OS version CPU and GPU name NOTES: The value of the {Domain name}
Windows operating system versions.) It gathers the following information and reports it to its servers: MAC Address IP Address Computer name OS version CPU and GPU name NOTES: The value of the {Domain name}
UPATRE was first spotted in August 2013, after the fall of Blackhole Exploit Kit. Its variants usually arrive onto systems as malicious files attached to spammed messages, or as a link to a malicious
ensure that only one of its copies runs at any one time: Global\powerv5 Information Theft This Trojan gathers the following data: OS Version MAC Address List of AV products from the victim's machine OS
ensure that only one of its copies runs at any one time: Global\powerv5 Information Theft This Trojan gathers the following data: OS Version MAC Address List of AV products from the victim's machine OS
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
{42BED48C-0BC1-46E5-BA9E-36D27915DDCF}_is1 InstallDate = "20180924" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ {42BED48C-0BC1-46E5-BA9E-36D27915DDCF}_is1 MajorVersion = "2" HKEY_LOCAL_MACHINE\SOFTWARE
AUOptions = 2 HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ Policies\Microsoft\Windows\ WindowsUpdate\AU ScheduledInstallDay = 0 HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ Policies\Microsoft\Windows\ WindowsUpdate
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *?
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival Details