Keyword: MS10-087
56022 Total Search   |   Showing Results : 621 - 640
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run MS Service Manager = "%User Temp%
This is the Trend Micro detection for files that exhibit certain behaviors. This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be
This Trojan connects to a website to send and receive information. It deletes itself after execution. Installation This Trojan drops the following copies of itself into the affected system: %System%\
TROJ_AGENT.JAAK. It drops a non-malicious .DOC file. When the said file is opened, it executes an instance of Microsoft Word. MS Word then loads the file as a normal .DOC file. This Trojan bears the file icons of
This is a Trend Micro detection for specially crafted .JPG, .PNG, .SWF, .PDF, .BMP and .GIF picture files that contains an iframe pointing to the possibly malicious websites. This Trojan arrives as
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Dropping Routine This Trojan drops the following files: %User Temp
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This worm may arrive via
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It listens on ports. However, as of this
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor executes the commands from a remote malicious user. This backdoor steals the information. This backdoor may be dropped by other malware. Arrival Details This backdoor may be dropped by
It takes advantage of certain vulnerabilities. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially