Search
Keyword: JS_EXPLOIT
v6.02.exe Counter-Strike Serial key generator [Miona patch].exe Daemon Tools Pro 4.8.exe DCOM Exploit archive.exe DivX 5.x Pro KeyGen generator.exe Divx Pro 7.x version Keymaker.exe Download Accelerator Plus
This Trojan may arrive bundled with malware packages as a malware component. Arrival Details This Trojan may arrive bundled with malware packages as a malware component. NOTES: This Trojan executes
This Trojan arrives as attachment to mass-mailed email messages. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Download Routine This Trojan connects to the
This Trojan may be downloaded from remote sites by other malware. It takes advantage of unknown vulnerabilities in certain software to download malicious files. It executes the downloaded files. As a
malicious script file, which takes advantage of a 0-day exploit in Firefox. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This backdoor may
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
strings, it pauses the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft)
It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Steals information
mip-xp-cht CWS01_03 wilbert-SC2202 CWS05D102 It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other
rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other malware, Via email Connects to URLs/IPs, Compromises system
does not exploit any vulnerability. HEUR:Trojan.Win32.Generic(Kaspersky),a variant of Win32/Agent.WGN(NOD32) Dropped by other malware Executes files
capabilities. It does not exploit any vulnerability. Dropped by other malware Executes files, Connects to URLs/IPs
text contains any of the said strings, it will pause the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability.
capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft); Downloader.Ponik (Symantec) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs
any of the said strings, it will pause the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability.
rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other malware, Via email Connects to URLs/IPs, Compromises system
non-malicious file card.doc . It will then open the file card.doc to deceive users that it is a normal document file. It does not have rootkit capabilities. It does not exploit any vulnerability. Downloaded from
exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Dropped by other malware Gathers system information
non-malicious file kptl.doc. It will then open the file kptl.doc to deceive users that it is a normal file. It does not have rootkit capabilities. It does not exploit any vulnerability. Backdoor.Emdivi (Symantec)
execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability. a variant of Win32/Agent.WGN trojan(NOD32),Found Win32/DH