Search
Keyword: (ms10-061) vulnerability in print spooler service could allow remote code execution (2347290)
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited ...
This Microsoft Word Document malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed.
Specifically, it makes use of 2012 Olympics to entice user...
This Trojan opens its dropped file %User Temp%\document.doc in order to hide its malicious routines from the user.This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propag...
This Microsoft Word document malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of North Korea rocket launch to ...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It exec...
This Trojan takes advantage of the RTF Stack Buffer Overflow Vulnerability in order to drop malicious files into an affected system.Once it exploits the said vulnerability, it drops a file, which is detected as TROJ_DROPR.VTG. This Trojan executes th...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses a list of user names to gain access to password-protected shares. It uses a list of passwords to gain...
Nowadays, cybercriminals are prone to using zero-day vulnerabilities as part of their typical attack pattern. The software of known IT companies such as Microsoft and Adobe are likely targe...
This Trojan arrives as attachment to mass-mailed email messages.It does not have any propagation routine.It does not have any backdoor routine.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the...
This update resolves several vulnerabilities in various versions of Internet
Explorer. Some of the vulnerabilities, when exploited successfully, may allow
remote code execution.
...
A remote code execution vulnerability exists in Microsoft Internet
Explorer. The vulnerability exists as an invalid pointer reference
within Internet Explorer. It is p...
This is the Trend Micro detection for files that propagate via vulnerablity in Windows Shell that could allow arbitrary commands to be executed.This Worm drops file(s)/component(s) detected as RTKT_STUXNET.A. It also drops non-malicious files. It dro...
Microsoft addresses the following vulnerabilities in its May batch of patches:
(MS16-051) Cumulative Security Update for Internet Explorer (3155533)
Risk Rating: Critical
This security update res...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Microsoft addresses the following vulnerabilities in its batch of patches for June 2015:
(MS15-056) Cumulative Security Update for Internet Explorer (3058515)
Risk Rating: Critical
This security ...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It steals certain information from the system and/or the user.However, as of this writing, the said sit...
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files with specific file extensions.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.