Keyword: troj_agent2222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222
49032 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan may be downloaded from remote sites by other malware. Arrival Details This Trojan may be downloaded from the following remote site(s): http://web.kfc.ha.cn:6668/Down/my/124.exe It may be
Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\m1RC DateUsed = "1354739051" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ m1RC DisplayName = "m1RC
HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Uninstall\ mIRC HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed =
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed = "1324714786
\svchost.exe -uninstall" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ irc EditFlags = "{random values}" HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent VoiceEnabled = "1" HKEY_CURRENT_USER\Software\Microsoft
This Trojan creates a window with the title "Windows Internet Explorer" and may display content from certain non-malicious sites. If the user attempts to close the window it will continue to create
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware arrives as a file with ".p7c" extension (Digital ID File) and is bundled with a malware detected by Trend Micro as TROJ_LOADR.AUJQ as its autostart component. This Trojan arrives as
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ NetworkAgentDriver\tg\t57 HKEY_LOCAL_MACHINE\SOFTWARE\Clients\ NetworkAgentDriver\tg\t58 HKEY_LOCAL_MACHINE\Software\Tz0\ Agent HKEY_LOCAL_MACHINE\SOFTWARE\Clients
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. Arrival Details This Trojan may be downloaded by other malware/grayware/spyware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a