Keyword: URL
43762 Total Search   |   Showing Results : 3521 - 3540
URL to continue the purchase: http://{BLOCKED}begun.org/customers/buy.php NOTES: It changes the attributes of the files on the affected system to Hidden . This is to trick users that the system has
When users agree to buy the software, it connects to the following URL to continue the purchase: http://{BLOCKED}.{BLOCKED}.174.135 http://{BLOCKED}.{BLOCKED}.170.125
\CurrentControlSet\ Services\RapportMgmtService Other Details This Trojan deletes the initially executed copy of itself NOTES: It connects to the following URL to inform a remote malicious user of its installation:
information, URL where the configuration file can be downloaded, codes for web inject, and monitored URLs. Other Details It does not have rootkit capabilities. It does not exploit any vulnerability.
contents of the configuration file. The configuration file also contains the "drop zone" where it sends stolen information, URL where the configuration file can be downloaded, codes for web inject, and
Opera Mini at http://{BLOCKED}y.ru/get/1oZpW , or click Next to automatically reboot. Button Выход : Exit Button Открыть : Open Clicking the button Открыть (Open), the user is directed to the URL http://
to purchase the full version of the software. When users agree to buy the software, it connects to the following URL to continue the purchase: http://{BLOCKED}ail.org
(TCP/UDP Flooding) Retrieve Stored Browser Passwords Update / Remove self Download and execute arbitrary files USB Spreader Visit a URL / Display pop-up advertisements It connects to the following URL(s) to
" HKEY_CURRENT_USER\Software\Microsoft\ WAB\WAB4\Wab File Name Default = "%Application Data%\Microsoft\Address Book\winxp.wab" Download Routine This spyware downloads the file from the following URL and renames the
the contents of the configuration file. The configuration file also contains the drop zone where it sends stolen information, the URL where the configuration file can be downloaded, the codes for web
Routine This Trojan executes the following commands from a remote malicious user: Download and execute files Perform Slowloris flooding Execute shell commands Copy itself in removable drives Open a URL
the said registry entry is http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\URL\ Prefixes www = "http://www.{BLOCKED
of the configuration file. The configuration file also contains the drop zone where it sends stolen information, the URL where the configuration file can be downloaded, the codes for web injection, and
users agree to buy the software, it connects to the following URL to continue the purchase: http://{BLOCKED}reensboro.org/customers/buy.php
{8FE24C7B-78F2-4B29-9357-84C3B4625AEE} DisplayName = "????" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\SearchScopes\{8FE24C7B-78F2-4B29-9357-84C3B4625AEE} URL = "http://s8.{BLOCKED}o.com/search?q={searchTerms}&pid
{120E090D-9136-4b78-8258-F0B44B4BD2AC} MenuStatusBar = "MaxSpeed" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main Use Custom Search URL = "1" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main Search Bar =
spyware attempts to get information from a list of banks or financial institutions. Drop Points The said file is then sent to the following URL via HTTP POST: http://{BLOCKED}.{BLOCKED}.211.116/zs/gate.php
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\wuauserv Rogue Antivirus Routine When users agree to buy the software, it connects to the following URL to continue the purchase: {BLOCKED}kymyje.com {BLOCKED
product, users are directed to a certain website asking for sensitive information, such as credit card numbers. When users agree to buy the software, it connects to the following URL to continue the
commands. It also connects to a URL in order to listen for these commands as well. This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting