Search
Keyword: kazaa
{folder path}\grokster\my grokster\ {folder path}\icq\shared folder\ {folder path}\kazaa lite k++\my shared folder\ {folder path}\kazaa lite\my shared folder\ {folder path}\kazaa\my sharedfolder\ {folder
Propagation This worm drops copies of itself into the following folders used in peer-to-peer (P2P) networks: Kazaa Lite\My Shared Folder Kazaa\My Shared Folder Edonkey2000\Incoming Icq\Shared Files emule
Propagation This worm drops copies of itself into the following folders used in peer-to-peer (P2P) networks: Kazaa Lite\My Shared Folder Kazaa\My Shared Folder Edonkey2000\Incoming Icq\Shared Files emule
\CurrentVersion\Run Winlogin = "%System%\winlogin.exe" Other System Modifications This worm adds the following registry keys: HKEY_CURRENT_USER\Software\eMule HKEY_CURRENT_USER\Software\Kazaa\ LocalContent
peer-to-peer (P2P) networks: Ares BearShare iMesh Shareaza Kazaa DC++ Emule LimeWire It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected
capabilities: Propagates through the following P2P applications: Kazaa BearShare iMesh Shareaza DC++ Emule LimeWire Ares Performs denial of service (DoS) attacks on affected systems using SYN flooding Drops an
Files%\edonkey2000\incoming\ %Program Files%\kazaa lite k++\my shared folder\ %Program Files%\kazaa lite\my shared folder\ %Program Files%\kazaa\my shared folder\ %Program Files%\winmx\shared\ %System
\Incoming\Mirc.exe %Program Files%\Morpheus\My Shared Folder\Mirc.exe %Program Files%\Bearshare\Shared\kespersky Keys Generator.exee %Program Files%\Kazaa\My Shared Folder\Mirc.exe %Program Files%\Ares\My
%Program Files%\kazaa\my shared folder %Program Files%\limewire\shared %Program Files%\morpheus\my shared folder %Program Files%\tesla\files %Program Files%\winmx\shared (Note: %User Profile% is the current
eMule iMesh Kazaa LimeWire Shareaza It is also capable of performing DoS attacks on affected systems using SYN flooding. Propagates via peer-to-peer networks, Propagates via removable drives, Propagates
Files%\Shareaza\Downloads %Program Files%\emule\incoming\ %Program Files%\kazaa\my shared folder\ %Program Files%\kazaa lite\my shared folder\ %Program Files%\kazaa lite k++\my shared folder\ %Program
eMule iMesh Kazaa LimeWire Shareaza Performs a denial of service (DoS) attacks on infected systems using SYN flooding
iMesh Kazaa LimeWire Shareaza VirTool:Win32/Injector.gen!AD (Microsoft) ; Trojan.Lethic (Symantec) ; Trojan.Win32.Menti.big (Kaspersky) Propagates via peer-to-peer networks, Propagates via removable
\Macromedia key generator (all products).exe %Temp%\KaZaA media desktop v2.0 UNOFFICIAL.exe %Temp%\Microsoft key generator, works for ALL microsoft products!!.exe %Temp%\Microsoft Windows XP crack pack.exe
removable drives: MUSKO TWINS It drops copies of itself into the following folders used in peer-to-peer (P2P) networks: Ares BearShare DC++ eMule eMule Plus iMesh Kazaa Limewire Shareaza It drops the
\Macromedia key generator (all products).exe %Temp%\KaZaA media desktop v2.0 UNOFFICIAL.exe %Temp%\Microsoft key generator, works for ALL microsoft products!!.exe %Temp%\Microsoft Windows XP crack pack.exe
\Macromedia key generator (all products).exe %Temp%\KaZaA media desktop v2.0 UNOFFICIAL.exe %Temp%\Microsoft key generator, works for ALL microsoft products!!.exe %Temp%\Microsoft Windows XP crack pack.exe
PALEVO malware are worms known to be part of the Mariposa botnet. These worms are known to arrive via three different means: peer-to-peer (P2P) sharing programs such as Kazaa and Limewire , instant
" Propagation This worm creates the following folders in all removable drives: {removable drive letter}:\usecure It drops copies of itself into the following folders used in peer-to-peer (P2P) networks: Kazaa
downloaded file from links sent via messages in MSN messenger . It may also arrive via the following P2P networks: Ares BearShare DC++ eMule iMesh Kazaa Limewire Shareaza Backdoor.Trojan (Symantec);