Keyword: os2first
41648 Total Search   |   Showing Results : 61 - 80
Server 2012.) It drops the following copies of itself into the affected system: %Application Data%\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll file under
Server 2012.) It drops the following copies of itself into the affected system: %Application Data%\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll file under
Server 2012.) It drops the following copies of itself into the affected system: %Application Data%\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll file under
Server 2012.) It drops the following copies of itself into the affected system: %Application Data%\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll file under
Server 2012.) It drops the following copies of itself into the affected system: %Application Data%\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll file under
where: {string1} = first four letters of a dll file under System directory {string2} = last four letters of a dll file under System directory (Note: %Application Data% is the Application Data folder, where
system: %Application Data%\Microsoft\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll file under %System% directory {string2} = last four letters of a dll file under
Spy drops the following copies of itself into the affected system and executes them: %Application Data%\Microsoft\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll
Server 2012.) It drops the following copies of itself into the affected system: %Application Data%\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll file under
Server 2012.) It drops the following copies of itself into the affected system: %Application Data%\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll file under
where: {string1} = first four letters of a dll file under %System% directory {string2} = last four letters of a dll file under %System% directory (Note: %System% is the Windows system folder, where it
Server 2012.) It drops the following copies of itself into the affected system: %Application Data%\{string1}{string2}\{string1}{string2}.exe where: {string1} = first four letters of a dll file under
where: {string1} = first four letters of a dll file under %System% directory {string2} = last four letters of a dll file under %System% directory (Note: %System% is the Windows system folder, where it
institutions: Banco Popular Banif Cahoot Co-Operativebank First Direct HSBC Microsoft Myspace OSPM Smile Vkontakte Stolen Information This spyware sends the gathered information via HTTP POST to the following
information: OS information (Architecture, Caption, CSDVersion) CPU Information (Name) Memory Information User Accounts Installed Programs Installed Services IP Configuration Network Information (Configuration,
Information regarding Point-Of-Sale (POS) systems in the network, by querying accounts or user name containing the following string: *POS* *REG* *CASH* *LANE* *STORE* *RETAIL* *BOH* *ALOHA* *MICROS* *TERM* OS
X.X.0.0 - X.X.255.255 (where X.X is the first 2 values of IP address affected host) Local network IP addresses It will then attempt to exploit MS17-010 vulnerability to inject and execute one of the
UPATRE was first spotted in August 2013, after the fall of Blackhole Exploit Kit. Its variants usually arrive onto systems as malicious files attached to spammed messages, or as a link to a malicious
Information Username Computername OS Version Hardware Information Running Processes However, as of this writing, the said sites are inaccessible. Web Browser Home Page and Search Page Modification This backdoor
fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *?