Keyword: URL
43724 Total Search   |   Showing Results : 1221 - 1240
machine uses high CPU power, which also requires more electricity. This may result in higher electricity bills. This hacking tool accepts the following parameters: -o, --url=URL - URL of mining server -O,
}b.com/enckey1 It connects to the following URL when the (Programme Test) hyperlink is clicked: https://www.{BLOCKED}se.com/ It has an uncalled function that can decrypt the files it encrypts. It opens a window
user: Update itself via Local file or URL Reconnect or Disconnect itself Remote Desktop Access on Network Devices connected Uninstall itself Remote Shell Search, Create, Modify, Rename and Delete Registry
following URL to continue the purchase: http://{BLOCKED}ersec.com/p http://{BLOCKED}me.com/p http://{BLOCKED}payme.com/p http://{BLOCKED}e-bill.com/p http://{BLOCKED}rketpay.com/p http://{BLOCKED}ysafe.com/p
information. The spammed message purports as an email notification from Keybank and lures users into clicking a malicious link. Once the URL is clicked, it redirects to a site hosting a malicious JavaScript.
LinkedIn probably to trick users into thinking that the email is legitimate. Furthermore, it contains a malicious URL that points to a website that sells bogus sexual enhancement products. Users are reminded
user to download a doc file using the malicious link different from what is displayed: The URL downloads from a fake db.com site: Then redirects to the real db.com: Once the user enables the macro
Spammers are now using IDN (Internationalized domain name) in spam URLs. IDNs are domain names or Web addresses that use non-English/non-ASCII characters. Recent spam samples spotted used an IDN URL
A malicious URL that supposedly allows users to know who viewed their profiles in Facebook is spotted in the wild. The URL, {BLOCKED}ws-facebook-profile.com looks like the legitimate Facebook page.
processes running in memory. NOTES: This Trojan attempts to connect to the following possibly malicious URL to download a file: http://{BLOCKED}unter.myfw.us As a result, routines of the downloaded file may
is a Java class file that is used to execute an exploit code. Once successful, it may download and execute a possibly malicious file from a certain URL. The URL where this malware downloads the said
may be unknowingly downloaded by a user while visiting malicious websites. Download Routine This Trojan downloads the file from the following URL and renames the file when stored in the affected system:
from a specified URL passed onto it as a parameter. The downloaded file is executed using the command below: regsvr32 -s {rmalware name}.exe As a result, the routines of the downloaded malware are also
system is 'Windows', it downloads a possibly malicious file from a certain URL. Otherwise, it terminates itself. The URL where this malware downloads the said file depends on the parameter passed on to it
saves the file from the URL specified in the parameter options as %User Temp%\tempfiles.exe . It then executes the downloaded file. (Note: %User Temp% is the current user's Temp folder, which is usually
downloaded files are exhibited on the affected system. NOTES: This trojan checks if the operating system used on the affected system is 'Windows'. It then downloads a file from a certain URL and saves the
Trojan exploits certain versions of Adobe Flash Player . Once it successfully exploits the said vulnerability, it connects to the following URL where it is hosted to download and execute a possibly
downloaded files are exhibited on the affected system. It downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by
Connects to the following URL to execute a script file: https://{BLOCKED}w.{BLOCKED}usercontent.com/sharkush/test1/master/calcush.sct Executes calc.exe It takes advantage of the following vulnerabilities:
hosted on a website and run when a user accesses the said website. Download Routine This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file