Search
Keyword: URL
This Coinminer arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It exploits software vulnerabilities to propagate to other computers across a network.It executes the downloaded files. As a result, malic...
The added .JOB files (scheduled tasks) attempt to access a URL. The said URL only displays a nonmalicious image when accessed. It may require additional parameters to download other possibly malicious file(s). It displays certain graphical user inter...
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.
This Trojan is a specially crafted Advanced Streaming Format (ASF) file which, when opened in Windows Media Player, accesses a URL. The URL visited redirects the user to another URL that steals user information.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files found in specific folders. It drops files as ransom note.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.It deletes itself after execution.
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops copies of itself in removable drives. These dropped copies use the ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies files, disabling programs and applications from properly running.It deletes itself after execut...
This malware is a backdoor with the primary purpose of stealing information from online transactions. The list of the monitored URLs can also be dynamically updated by a cybercriminal. It also has features to enable it to run on Windows Vista and Win...
This Trojan may be downloaded by other malware/grayware from remote sites.It requires its main component to successfully perform its intended routine. It deletes itself after execution.
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It may be unknowingly downloaded by a user while visiting malicious websites.It uses Windows Task Scheduler to create a schedule...
The URL validation functionality in Microsoft Internet Explorer 5.01, 6, 6 SP1, 7 and 8, and the ShellExecute API function in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, does not properly process input paramete...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to m...
Mozilla Firefox 3 before 3.0.11 associates an incorrect principal with a file: URL loaded through the location bar, which allows user-assisted remote attackers to bypass intended a...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan registers the receivers BootReceiver and AlarmReceiver which are responsible for starting the service called MonitorService. This service communicates with the malicious server and obtains data needed to execute its payload.It installs a ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It displays advertisements on Internet browsers.