Keyword: JS_EXPLOIT
10404 Total Search   |   Showing Results : 361 - 380
does not exploit any vulnerability. HEUR:Trojan.Win32.Generic(Kaspersky),a variant of Win32/Agent.WGN(NOD32) Dropped by other malware Executes files
capabilities. It does not exploit any vulnerability. Dropped by other malware Executes files, Connects to URLs/IPs
mip-xp-cht CWS01_03 wilbert-SC2202 CWS05D102 It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other
rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other malware, Via email Connects to URLs/IPs, Compromises system
strings, it pauses the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft)
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft); Downloader.Ponik (Symantec) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs
non-malicious file card.doc . It will then open the file card.doc to deceive users that it is a normal document file. It does not have rootkit capabilities. It does not exploit any vulnerability. Downloaded from
any of the said strings, it will pause the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability.
exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Dropped by other malware Gathers system information
It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Steals information
rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other malware, Via email Connects to URLs/IPs, Compromises system
text contains any of the said strings, it will pause the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability.
This malware exploits a Windows XP/Server 2003 zero-day vulnerability. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the
non-malicious file kptl.doc. It will then open the file kptl.doc to deceive users that it is a normal file. It does not have rootkit capabilities. It does not exploit any vulnerability. Backdoor.Emdivi (Symantec)
affected system. In 2010, TRACUR variants were spotted to be the final payload in a vulnerability exploit that involved .MOV files and a certain feature in the video player application Quicktime . Users
deceive users that it is a normal file. It does not have rootkit capabilities. It does not exploit any vulnerability. Spammed via email, Downloaded from the Internet, Dropped by other malware Compromises
execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability. a variant of Win32/Agent.WGN trojan(NOD32),Found Win32/DH
}motreu.ch/pro-kimai/gate.php?client_id={value}&connected={value}&server_port={value}&debug={value} However, these URLs are already inaccessible. It does not have rootkit capabilities. It does not exploit any vulnerability.
welcome whatever william windows winner wisdom zxcvbnm It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan-PWS.Win32.Tepfer (Ikarus), Trojan-PSW.Win32.Tepfer.fjjm (Kaspersky