Keyword: JS_INJECT
7747 Total Search   |   Showing Results : 601 - 620
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
Other Details This Backdoor adds the following lines or registry entries as part of its routine:
Installation This Trojan drops the following files: %User Temp%\40.tmp %User Temp%\4B.tmp %User Temp%\48.tmp %User Temp%\47.tmp %User Temp%\3B.tmp %User Temp%\4A.tmp %User Temp%\3C.tmp %User Temp%
Other Details This Trojan adds the following lines or registry entries as part of its routine:
Other Details This Trojan adds the following lines or registry entries as part of its routine: {BLOCKED} {BLOCKED} {BLOCKED} {BLOCKED} {BLOCKED} {BLOCKED} -->
It adds registry entries to enable its automatic execution at every system startup. It creates folders where it drops its files. It connects to certain URLs. It may do this to remotely inform a
This backdoor connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts
This malware takes advantage of a vulnerability in Microsoft Word with the way it handles specially crafted email messages in RTF format. To get a one-glance comprehensive view of the behavior of
This backdoor may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the said sites are inaccessible. It may be
These are .SYS files modified by TDSS malware to aid its routines. The patched codes are responsible for executing the malware during startup and inject its component files into running processes. It
It opens a hidden instance of svchost.exe and injects codes in it. Once it has passed its code of execution to svchost.exe , it sleeps for 1000 milliseconds and delete its physical copy to prevent
Installation This Trojan adds the following mutexes to ensure that only one of its copies runs at any one time: ZZ8343E32F64b1fA50C77B99F5A2C14 Other Details This Trojan does the following: Executes
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Installation This Trojan drops the following copies of itself
file version. If conditions are met, this worm runs any of these files and injects itself to them. If none of these processes were found, it then inject itself in LSASS.EXE . It can also find the
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file