Keyword: JS_INJECT
7753 Total Search   |   Showing Results : 641 - 660
Installation This Trojan drops the following files: %User Temp%\40.tmp %User Temp%\4B.tmp %User Temp%\48.tmp %User Temp%\47.tmp %User Temp%\3B.tmp %User Temp%\4A.tmp %User Temp%\3C.tmp %User Temp%
Other Details This Trojan adds the following lines or registry entries as part of its routine:
Other Details This Trojan adds the following lines or registry entries as part of its routine: {BLOCKED} {BLOCKED} {BLOCKED} {BLOCKED} {BLOCKED} {BLOCKED} -->
It opens a hidden instance of svchost.exe and injects codes in it. Once it has passed its code of execution to svchost.exe , it sleeps for 1000 milliseconds and delete its physical copy to prevent
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan hides all files on the system. It drops files detected as BKDR_INJECT.BKP and TROJ_DROPPR.CZ. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It executes the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives onto users systems as a spoofed FedEx email notification. This spyware may also use a purely random set of characters as its file name. It connects to certain servers to report
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
POISONIVY, also known as POISON, is a popular Remote Administration Tool (RAT) backdoor available in the underground market. It has been in circulation for years. In more recent times, this family of