Keyword: os2first
41683 Total Search   |   Showing Results : 81 - 100
/appScreen/progress_bg.png {BLOCKED}nstaller.appspot.com /install/first_time?session_id={session ID}&app_id={id}&offer_id={value}&os_version={Mac OS X Version} &install_version={value}&r={value}&disable_dynamic_update={value
" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\m{3 random alphabetic characters}svc Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\m{3 random alphabetic characters}svc ErrorControl = "1
characters}svc Type = "20" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\m{3 random alphabetic characters}svc Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\m{3 random alphabetic
Wireshark.exe procexp.exe ProcessHacker.exe PCHunter32.exe JoeTrace.exe ResourceHacker.exe Information Theft This Trojan Spy gathers the following data: Username System Information OS Name and Version Hostname
Threat Diagram shown below. This Trojan is capable of sending text messages. It first checks the country code and operator code of the affected device. After sending the text message, it then opens a
ALDIBOT first appeared in late August 2012 in relevant forums. Variants can steal passwords from the browser Mozilla Firefox, instant messenger client Pidgin, and the download manager jDownloader.
Japan a target of online banking threats. Figure 1. Top countries affected by online banking malware in 4Q 2015 ROVNIX first emerged in the wild in 2014; it became known for its capability to run
This potentially unwanted application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potenitally Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
folder, where it usually is C:\Windows\System32 on all Windows operating system versions.) Information Theft This Trojan Spy steals the following information: OS information (Architecture, Caption,
DisableAntiSpyware = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft Windows Defender Security Center\ Notifications DisableNotifications = 1 Information Theft This Trojan Spy steals the following information: OS information
PCHunter64.exe PCHunter32.exe JoeTrace.exe ResourceHacker.exe Information Theft This Trojan Spy gathers the following data: Username Computer Name System Information OS Name and Version Hostname Geolocation IP
OS Version If the machine is running with administrative priviliges Drop Points This backdoor sends the information it gathers to remote users via HTTP Post. NOTES: The variable {Folder Name} in the
8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.) Information Theft This backdoor gathers the following data: Volume serial number OS version If the machine is running with
created svchost.exe instances Information Theft This Trojan Spy steals the following information: OS information (Architecture, Caption, CSDVersion) CPU Information (Name) Memory Information User Accounts
\ Services\spsrv Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\spsrv DependOnService = "RPCSS" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\spsrv Description = "This Windows
affected system and executes them: %Application Data%\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll file under System directory {string2} = last four letters of a
the following copies of itself into the affected system and executes them: %Application Data%\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll file under System
the following copies of itself into the affected system and executes them: %Application Data%\Microsoft\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll file
Data%\Microsoft\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll file under System directory {string2} = last four letters of a dll file under System directory