Keyword: URL
43760 Total Search   |   Showing Results : 1801 - 1820
exhibited on the affected system. NOTES: This trojan contains a function that attempts to connect to a website to download a possibly malicious file. The URL where it is connecting to download files depends
possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components. It executes the downloaded file using the following
Settings\Temp on Windows 2000, XP, and Server 2003.) NOTES: This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter
NOTES: It also connects to the mentioned URL to report system infection and send system information such as: hostname ip address language machine name OS name proxy server system time username Note that
This Trojan may be hosted on a website and run when a user accesses the said website. It downloads a file from a certain URL then renames it before storing it in the affected system. It executes the
}\Local Settings\Temp on Windows 2000, XP, and Server 2003.) NOTES: This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on
The URL where this malware downloads the said file depends on the parameter passed on to it by its components. Exploit:Java/CVE-2012-1723.I (Microsoft), Exploit.Java.CVE-2012-0507.nc (Kaspersky),
running in the affected system's memory: cmd.exe msconfig.exe regedit.exe taskmgr.exe NOTES: It removes the taskbar. It accesses the following URL to display the ransom message: http://{random characters
Server 2003.. %Temp% is the Windows Temporary folder, which is usually C:\Windows\Temp or C:\WINNT\Temp.) Once downloaded, it executes the said file. However, the URL where the file is downloaded is not on
\Local Settings\setm.ini . The said configuration file contains the URL where this backdoor connects to, as well as the file names of components. It connects to the site http://{malicious site
by a user while visiting malicious websites. Download Routine This Trojan downloads the file from the following URL and renames the file when stored in the affected system: http://{BLOCKED}.{BLOCKED
the aforementioned URL using the Insert and Link feature found in MS Word . This feature is used so that when the link is inaccessible or cannot be loaded, it still displays the image.
downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the following parameter(s) passed on to it by its components: ldcrlio tt t Java/Exploit
visiting malicious sites. Download Routine This Trojan downloads the file from the following URL and renames the file when stored in the affected system: http://{BLOCKED}l.com/34/da.exe It saves the files it
downloaded files are exhibited on the affected system. It downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by
software vulnerabilities to download possibly malicious files: Oracle Java SE Remote Java Runtime Environment Vulnerability It downloads a possibly malicious file from a certain URL. The URL where this
downloaded files are exhibited on the affected system. It downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by
Server 2003.) NOTES: This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components. It
"explorer.exe" .) Other Details This Ransomware does the following: It executes the following commands to shutdown the system within 4 minutes: shutdown -s -t 240 It connects to the following URL for stat
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it