Keyword: JS_EXPLOIT
10404 Total Search   |   Showing Results : 361 - 380
strings, it pauses the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft)
mip-xp-cht CWS01_03 wilbert-SC2202 CWS05D102 It does not have rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other
does not exploit any vulnerability. HEUR:Trojan.Win32.Generic(Kaspersky),a variant of Win32/Agent.WGN(NOD32) Dropped by other malware Executes files
capabilities. It does not exploit any vulnerability. Dropped by other malware Executes files, Connects to URLs/IPs
text contains any of the said strings, it will pause the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability.
exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Dropped by other malware Gathers system information
rootkit capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft) Downloaded from the Internet, Dropped by other malware, Via email Connects to URLs/IPs, Compromises system
any of the said strings, it will pause the execution of its malicious routine by performing a Sleep command. It does not have rootkit capabilities. It does not exploit any vulnerability.
capabilities. It does not exploit any vulnerability. Trojan:Win32/Xabil.A (Microsoft); Downloader.Ponik (Symantec) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs
non-malicious file card.doc . It will then open the file card.doc to deceive users that it is a normal document file. It does not have rootkit capabilities. It does not exploit any vulnerability. Downloaded from
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
command. It does not have rootkit capabilities. It does not exploit any vulnerability. Dropped by other malware Compromises system security, Executes files
non-malicious file kptl.doc. It will then open the file kptl.doc to deceive users that it is a normal file. It does not have rootkit capabilities. It does not exploit any vulnerability. Backdoor.Emdivi (Symantec)
deceive users that it is a normal file. It does not have rootkit capabilities. It does not exploit any vulnerability. Spammed via email, Downloaded from the Internet, Dropped by other malware Compromises
affected system. In 2010, TRACUR variants were spotted to be the final payload in a vulnerability exploit that involved .MOV files and a certain feature in the video player application Quicktime . Users
}motreu.ch/pro-kimai/gate.php?client_id={value}&connected={value}&server_port={value}&debug={value} However, these URLs are already inaccessible. It does not have rootkit capabilities. It does not exploit any vulnerability.
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
viewed. This action guarantees continuous infection and increases security risk of the infected system. NOTES: This file infector does not have rootkit capabilities. It also does not exploit any
host either on the LAN/Internet with open port 445, it will attempt to exploit MS17-010 vulnerability to drop and execute a copy of itself to the remote host. It uses the following file path for its
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This malware arrives via the following means: delivered by exploit kits Installation This Trojan