Keyword: URL
43760 Total Search   |   Showing Results : 1881 - 1900
the following URL to possibly inform the remote user of an infection or to receive more information: http://bravox0005.{BLOCKED}pg.com.br/vtoken.html
This Trojan downloads the file from the following URL and renames the file when stored in the affected system: http://{BLOCKED}ensourcecms.com/include/o.exe http://{BLOCKED
URL using the default browser of the affected system Force the user to input login credentials Shutdown the remote computer Restart the remote computer Put the system into sleep mode Send a message
This Trojan may be downloaded using malicious QR codes. Once the malicious QR code is scanned, the user will be redirected to a URL where the malicious file can be downloaded. It then sends text
http://208.110.85.172/bl.js Other Details This Trojan does the following: It is capable of following in the affected user's Facebook account: Post links to friends walls Send url to online friends via Chat Subscribe as a Fan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it
packages. It downloads a file from a certain URL then renames it before storing it in the affected system. It executes the downloaded files. As a result, malicious routines of the downloaded files are
svchost.exe Other Details This Trojan deletes the initially executed copy of itself NOTES: It connects to the following URL to report system infection: http://{BLOCKED}ayom2001.ru/forum3/task.php?bid={parameter
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it
" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\SearchScopes\infoaxe_google\ URL 604 = "http://www.infoaxe.com/enhancedsearch.jsp?cx=partner-pub-6808396145675874:scfw9ganq4h&cof=FORID:10&ie=ISO-8859-1&q=
Settings\Temp on Windows 2000, XP, and Server 2003.) NOTES: This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter
file. However, the URL where the malware connects to is not in the malware body. VirTool:Win32/Injector.gen!AD (Microsoft)
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it
or as a file downloaded unknowingly by users when visiting malicious sites. Download Routine This Trojan downloads the file from the following URL and renames the file when stored in the affected
malware itself. These arguments may come from another malware (dropper or downloader) which feeds the URL where this backdoor connects to. It may require other components to properly execute.
file from the URL http://{BLOCKED}.{BLOCKED}.100.171/manual/a.c and saves it as /tmp/a.c . The downloaded file is detected as TROJ_KAITEN.A. Using the installed GNU compiler, it compiles /tmp/a.c to
data contains the following: As of this writing, it downloads an arbitrary file from the URL http://u10374.{BLOCKED}s.hc.ru/test1.zip as file2.exe . It creates the following registry entry to enable
malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components. Java/Exploit.BXN(AVG), Exploit:Java/Fashack.D(Microsoft),
files from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components. Exploit:Java/CVE-2012-1723.AZ (Microsoft),
from a certain URL. The URL where this malware downloads the said file depends on the following parameter(s) passed on to it by its components: val prime Other Details This Trojan requires its main