Keyword: JS_INJECT
7764 Total Search   |   Showing Results : 3861 - 3880
into a new section and calls the entry point to execute the malicious routine. This last binary us responsible for the following routines: Download additional components Inject components into memory
any one time: yUo9Ck1Io NOTES: It will check If the process notepad.exe is running on the affected system. It will then inject codes into the said process. It accesses the following URL: http://{BLOCKED
However, if any of the above-mentioned processes is found, it creates a new process of the reference file and patches malware code into it. It may also use the following processes to inject its code if the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of software vulnerabilities in certain software to drop malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled
Download files Gather information about the affected computer(Disk drive serial number, System drive details, Operating system, Processor architecture) Infect Drives Inject itself to WinRAR Open IM
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies
NOTES: This is the Trend Micro detection for .SYS files that are modified by TDSS malware to aid its routines. The patched codes are responsible for executing the malware during startup and inject
This Trojan may be downloaded by other malware/grayware from remote sites. Arrival Details This Trojan may be downloaded by the following malware/grayware from remote sites: TROJ_SCRIPBRID.A It may
This spyware arrives as attachment to mass-mailed email messages. It does not have any propagation routine. It does not have any backdoor routine. It modifies the Internet Explorer Zone Settings. As
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This spyware arrives as an attachment to spammed messages pretending to be from Fidelity Investments. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It does not have
file Inject scripts to a visited webpage Block Java execution on a visited webpage Block HTTP POST request to a webpage It is capable of stealing user credentials related the following protocols: POP2
command Download and inject remote codes to legitimate processes Log keystrokes and active window Capture screenshots View webcam activity Listen to microphone audio Update/uninstall the malware Connects to
its backdoor routines. This backdoor has the following capabilities: Capture screen shots, webcam, audio Delete, search, and upload files Download and inject remote codes to legitimate processes Log
where this malware injects its code for its backdoor routines. This backdoor has the following capabilities: Capture screen shots, webcam, audio Delete, search, and upload files Download and inject remote
Capture screen shots, webcam, audio Delete, search, and upload files Download and inject remote codes to legitimate processes Log keystrokes and active window Manage processes and services Modify and search
Manage processes and services View and terminate active windows and ports Perform a shell command Download and inject remote codes to legitimate processes Log keystrokes and active window Capture