Search
Keyword: pe_kaze.4236
PE_VIRUX.AA-O performs a DNS request to this URL.
PE_VIRUX.AA-O adds this string in the Windows HOSTS file.
PE_VIRUX.AA-O connects to this IRC server using UDP and TCP port 80.
PE_VIRUX.AA-O connects to this IRC server using UDP and TCP port 80.
The domain is related to PE_LICAT.B-O.
�This url is related to PE_LICAT.B-O, and this link downloads the configuration file.
JS_SHELLCOD.SMGU accesses this URL to download PE_PARITE.A.
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/2611201045724.jpeg How do users get this Web threat? The threat arrives via a spoofed email message from Microsoft with the subject "Microsoft
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/104201551346.jpeg URSNIF is a family of spyware notorious for adopting different behaviors from other malware types (e.g., backdoors , file infectors
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/172201574529.jpeg Imagine a targeted attack that aims for financial profit rather than the typical stealing of enterprise’s “crown jewels” or
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/072201110445.jpeg It is inevitable for vulnerabilities that can be exploited in commercial software to exist. The reasons for this are innumerable
When executed, PE_QUERVAR.D connects to this malicious URL.
When%20executed%2C%20PE_QUERVAR.D%20connects%20to%20this%20malicious%20URL.
PE_QUERVAR.E-O connects to this site to download and execute a ransomware detected as TROJ_RANSOM.CMY. The said ransomware pretends to enforce copyright laws and locks the affected system, preventing
PE_QUERVAR.E-O connects to this site to download and execute a malicious file, detected as HTML_RANSOM.CMY.
http://{BLOCKED}ewidea1.ru/1.php?{random characters}&pin={random characters}&crc={random characters}
PE_QUERVAR.E-O connects to this site to download and execute a ransomware detected as TROJ_RANSOM.CMY. The said ransomware pretends to enforce copyright laws and locks the affected system, preventing
http://{BLOCKED}oservisi.com/test/php/way.php?{random characters}&pin=58252D00982BC1DA&crc={random characters}
PE_QUERVAR.E-O connects to this site to download and execute a ransomware detected as TROJ_RANSOM.CMY. The said ransomware pretends to enforce copyright laws and locks the affected system, preventing
http://{BLOCKED}l.ru/33797470/2a06754.50664748/3052832ace10d474336096b36fbd49f05f190.exe?{random characters}
PE_QUERVAR.E-O connects to this site to download and execute a malicious file detected as TROJ_SIREFEF.SZP
PE_QUERVAR.B-O connects to this site to download files, which may be malicious. However, as of this writing, the said sites are inaccessible.
PE_FUJACKS.CT-O connects to this possibly malicious URL.