Keyword: HTML_FPSYME
5718 Total Search   |   Showing Results : 3681 - 3700
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
TROJ_ZLOB.FZO can retrieve stored user names and passwords. If successful, the information is send to a specific site, making the network vulnerable to remote attacks. This Trojan changes the DNS
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This description is based is a compiled analysis of several variants of TROJ_KRYPTIK. Note that specific data such as file names and registry values may vary for each variant. This Trojan arrives as
verclsid.exe regedit.exe rundll32.exe cmd.exe regsvr32.exe Steal FTP login credentials Log to FTP sites and infect HTML files by inserting iframes. Hook certain APIs of Internet Explorer and Firefox to intercept
HTML files Join an IRC channel Log in to FTP sites Modifies the following system files: ipconfig.exe verclsid.exe regedit.exe rundll32.exe cmd.exe regsvr32.exe Perfrom Slowloris, UDP, and SYN flooding
This spyware may be dropped by other malware. It executes then deletes itself afterward. It connects to certain websites to send and receive information. Arrival Details This spyware may be dropped
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It is injected into all running processes to remain memory resident. Arrival Details This
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes
%User Temp%\IEXPLORE.EXE is a non-malicious HTML file. Trojan:Win32/Comitsproc (Microsoft) 12 for 2012: What Will The New Year Bring? Dropped by other malware, Downloaded from the Internet Downloads files
This Trojan may be downloaded by other malware/grayware from remote sites. Arrival Details This Trojan may be downloaded by the following malware/grayware from remote sites: PE_QUERVAR.E-O It may be
This Trojan encrypts files. When a user clicks on an encrypted file, the following image is displayed: This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan takes advantage of a vulnerability in a certain software to drop malicious files. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by
This Trojan connects to certain URLs using a specific format. If the connection is successful, it may download another file and execute it, thus also exhibiting its malicious routines. During
VUNDO is a family of Trojans, adware, and spyware first spotted in 2004. It usually arrives as a bundle of components, downloaded from malicious websites. VUNDO is multi-component, meaning it has
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be dropped by the