Keyword: HTML_SOHANAD
5893 Total Search   |   Showing Results : 3481 - 3500
This Trojan displays fake alerts upon installation. It displays fake scanning results about disk errors. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan may be downloaded by other malware/grayware from remote sites. Arrival Details This Trojan may be downloaded by the following malware/grayware from remote sites: PE_QUERVAR.E-O It may be
This Trojan encrypts files. When a user clicks on an encrypted file, the following image is displayed: This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain
This spyware may be dropped by other malware. It executes then deletes itself afterward. It connects to certain websites to send and receive information. Arrival Details This spyware may be dropped
This Trojan connects to certain URLs using a specific format. If the connection is successful, it may download another file and execute it, thus also exhibiting its malicious routines. During
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware may be downloaded from remote sites by other malware. It also has rootkit capabilities, which enables it to hide its processes and files from the user. It modifies the Internet Explorer
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays pop-up advertisements. Arrival Details This
%User Temp%\IEXPLORE.EXE is a non-malicious HTML file. Trojan:Win32/Comitsproc (Microsoft) 12 for 2012: What Will The New Year Bring? Dropped by other malware, Downloaded from the Internet Downloads files
This spyware is designed to steal banking information and is known in media reports as the “Ice IX bot”. It is based on Zeus 2.x source code, thus, its behavior is similar to Zeus incorporated with
This specially crafted PDF takes advantage of a Stack-based buffer overflow in CoolType.dll in certain versions of Adobe Reader and Acrobat . After successfully exploiting the said vulnerability, it
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It is injected into all running processes to remain memory resident. Arrival Details This