Search
Keyword: os2
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
disableCMD = "2" (For OS Version XP and below) Propagation This worm searches for folders in all physical and removable drives then drops copies of itself inside the folder as {folder name}.EXE . Generic15.YOY
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
processes: %System%\cmd.exe /c ping -n 2 127.0.0.1 > nul && del %User Temp%\87322C~1.EXE > nul %System%\Tlctl.exe -auto %System%\Tlctl.exe -acsi %System%\PING.EXE ping -n 2 127.0.0.1 (Note: %User Temp% is the
distribution page. Each mobile OS has its respective official website, where users may purchase and download the mobile apps. These app stores are similar to how we download software and programs from respective
This Trojan may install itself on the infected system as a rogue antivirus using certain file names. If the user decides to purchase the rogue product it may display a window that asks for the user's
This Trojan moves .LNK files to the folder it creates and modifies the attributes of the files found in the affected system. This tricks the users into believing that the files have been deleted.
This Trojan moves .LNK files to the created folder %User Temp%\smtmp . It also modifies the attributes of files found in the affected system into Hidden , to trick the users that the files have been
attributes: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced Hidden = 2 (Note: The default value data of the said registry entry is 1 .) HKEY_CURRENT_USER\Software\Microsoft
the following registry entries to hide files with Hidden attributes: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced Hidden = 2 (Note: The default value data of the said
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Fighter Elsword Kingdom of the Winds Lineage MapleStory WinBaram World of Warcraft It retrieves the following information from the affected system: Mac Address OS version Installed AV software Number of
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It lowers the security setting of Internet Explorer. It connects to certain
This Trojan changes the attributes of the files on the affected system to Hidden . This is to trick the user that the system has serious hardware failure. This Trojan may be dropped by other malware.
with right-to-left (RTL) text directionality. nvd: Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000. CVE-ID: CVE-2010-0049 Available for: Mac OS X v10.4.11, Mac OS X Server
document with improperly nested tags. nvd: Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html 'WebKit CVE-ID: CVE-2010-0050 Available for: Mac OS X v10.4.11, Mac OS X Server
related to the run-in Cascading Style Sheets (CSS) display property. nvd: Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html CVE-ID: CVE-2010-0053 Available for: Mac OS X
document. Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html CVE-ID: CVE-2010-0048 Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5.8, Mac OS X Server