Keyword: MS10-087
57578 Total Search   |   Showing Results : 2341 - 2360
TSPY_ZBOT.CBZ sends the gathered information via HTTP POST to this URL.
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/132201375838.jpeg What is the watering hole technique? The term “ watering hole ” refers to initiating an attack against targeted businesses and
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/153201055748.gif How does this threat get into users' systems? WORM_IRCBOT.ABJ may be downloaded from remote site(s) by other malware or by an
TrendLabs received a slew of spammed messages that pose as an email notification from the social networking site Multiply . The message starts with an invitation for the recipient to be a friend of
After Apple co-founder Steve Jobs' death was made known to the public on October 6, 2011, several spam samples made rounds, taking advantage of Jobs' death. These spammed messages may come in
product keys for MS Office (2003, 2007), Windows Exchange Server (7, Vista), and SQL Server, and Skype contact details. What makes this threat notable? GOLROTED is our detection for both Predator Pain and
This URL is related to TROJ_SCAR.MS.
TROJ_GAMETHI.GD connects to this website to download and execute a malicious file.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It adds registry entries to enable its automatic execution at every system startup. Arrival Details This Trojan may
Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}1.{BLOCKED}er.ce.ms/index.php
\CurrentControlSet\ Services\MediaCenter DisplayName = "MS Media Control Center" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\MediaCenter\Parameters ServiceDll = "%System%\Prcmxnq.src" HKEY_LOCAL_MACHINE
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
GoFTP Ipswitch WS_FTP LeapWare LeapFTP LeechFTP LinasFTP MAS-Soft FTPInfo MS IE FTP Passwords NCH Software ClassicFTP NovaFTP Robo-FTP 3.7 SmartFTP SoftX.org FTPClient Staff-FTP TurboFTP WS_FTP WinFTP Ftp
This worm sends copies of itself to target recipients using the instant-messaging (IM) application, MSN Messenger . It executes commands from a remote user to connect to malicious sites to download
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\ODBC\ ODBC.INI\SuperMoneyCmp FIL = "Ms Access;" HKEY_LOCAL_MACHINE\SOFTWARE\ODBC\ ODBC.INI\SuperMoneyCmp ReadOnly = {random values} HKEY_LOCAL_MACHINE\SOFTWARE\ODBC\ ODBC.INI\SuperMoneyCmp\Engines\ Jet
\CurrentControlSet\ Services\MediaCenter DisplayName = "MS Media Control Center" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\MediaCenter\Parameters ServiceDll = "%System%\Prcmxnq.src" HKEY_LOCAL_MACHINE
This worm arrives via removable drives. It may be dropped by other malware. It modifies registry entries to disable various system services. This action prevents most of the system functions to be
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself