Keyword: HTML_IESLICE
5708 Total Search   |   Showing Results : 1641 - 1660
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
receive information: https://{BLOCKED}er.ru/topic.php It encrypts files with the following extensions: avi wav mp3 gif ico png bmp txt html It renames encrypted files using the following names: {original
This malware may be hosted on a website and run when a user accesses the said website. It takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
Trojan does not encrypt files with the following extensions: avi bat bmp chm cmd dll exe gif html ico inf ini lnk log manifest mp3 msi png scr sys tmp txt url wav It deletes shadow copies by executing the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan executes when a user accesses certain websites where it is hosted. It redirects browsers to certain sites. Arrival Details This Trojan executes when a user accesses certain websites where
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: Once
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It gathers certain information on the affected computer.
This malware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This malware arrives as an attachment to email messages spammed by other
files with the following extensions: pdf pot hta xlt pps xlw dot rtf ppt xls doc xml htm html wmv wm mpv2 mpg mpeg mpe mpa mp2v mpg mp2 m1v IVF asx asf wax snd rmi m3u au aiff aifc aif midi mid wma wav
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
files with the following extensions: pdf pot hta xlt pps xlw dot rtf ppt xls doc xml htm html wmv wm mpv2 mpg mpeg mpe mpa mp2v mpg mp2 m1v IVF asx asf wax snd rmi m3u au aiff aifc aif midi mid wma wav
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It gathers certain information on the affected computer.