Keyword: JS_PETCH
4697 Total Search   |   Showing Results : 2681 - 2700
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. Installation This Trojan drops
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This Trojan executes when a user accesses certain websites where it is hosted. As of this writing, the said sites are inaccessible. Arrival Details This Trojan executes when a user accesses certain
BLOCKED: http://img130.imagehacks.ws/img130/4302/logo.jpeg This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. Other Details Based on analysis of the codes, it has the following capabilities: takes
This Trojan connects to certain websites to send and receive information. Other Details This Trojan connects to the following website to send and receive information: http://www.{BLOCKED}onega.com
Other Details Based on analysis of the codes, it has the following capabilities: It may connect to the following URL related to pornography: http://www.{BLOCKED}ov.com
Other Details This Trojan is a zero-day exploit for the following vulnerability: Adobe Reader and Adobe Acrobat
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the said sites are inaccessible. It accesses websites to download files. This
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
This Trojan takes advantage of software vulnerabilities to allow a remote user or malware/grayware to download files. Download Routine This Trojan takes advantage of the following software
Other Details Based on analysis of the codes, it has the following capabilities: The malware decodes a Base-64 encoded text in the host HTML file, then executes the decoded text.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives as attachment to mass-mailed email messages. It may be unknowingly downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
Other Details Based on analysis of the codes, it has the following capabilities: Upon execution, it accesses the URL http://{BLOCKED}e.net/.go/check.html . The said URL may redirect to the following
This Trojan redirects browsers to certain sites. Other Details This Trojan redirects browsers to the following sites: http://{BLOCKED}team.com Connects to URLs/Ips
Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}rkstar.info:8080 http://{BLOCKED}nguide.at:8080 http://{BLOCKED}mecare.at:8080 http://{BLOCKED}be.ru:8080