Keyword: HTML_AGENT
15951 Total Search   |   Showing Results : 3521 - 3540
This Trojan connects to certain URLs using a specific format. If the connection is successful, it may download another file and execute it, thus also exhibiting its malicious routines. During
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware may be downloaded from remote sites by other malware. It also has rootkit capabilities, which enables it to hide its processes and files from the user. It modifies the Internet Explorer
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays pop-up advertisements. Arrival Details This
%User Temp%\IEXPLORE.EXE is a non-malicious HTML file. Trojan:Win32/Comitsproc (Microsoft) 12 for 2012: What Will The New Year Bring? Dropped by other malware, Downloaded from the Internet Downloads files
This spyware is designed to steal banking information and is known in media reports as the “Ice IX bot”. It is based on Zeus 2.x source code, thus, its behavior is similar to Zeus incorporated with
This specially crafted PDF takes advantage of a Stack-based buffer overflow in CoolType.dll in certain versions of Adobe Reader and Acrobat . After successfully exploiting the said vulnerability, it
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It is injected into all running processes to remain memory resident. Arrival Details This
HTML files Join an IRC channel Log in to FTP sites Modifies the following system files: ipconfig.exe verclsid.exe regedit.exe rundll32.exe cmd.exe regsvr32.exe Perfrom Slowloris, UDP, and SYN flooding
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
verclsid.exe regedit.exe rundll32.exe cmd.exe regsvr32.exe Steal FTP login credentials Log to FTP sites and infect HTML files by inserting iframes. Hook certain APIs of Internet Explorer and Firefox to intercept
Messenger messages Insert iframe tags into HTML files Visit a Web page Create processes Block DNS Redirect domains Steal login credentials Log in to FTP sites It connects to the following URL(s) to send and
address to send and receive information. It has the following backdoor capabilities: Block DNS Create processes Download other files Insert iframe tags into HTML files Join an IRC channel Log in to FTP