Keyword: troj _ vundo
44738 Total Search   |   Showing Results : 841 - 860
Once users access any of the monitored sites, it starts logging keystrokes. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
When executed, this Trojand rops files. These files are copies of itself and some non-malicious files. It also creates folders on the infected system. Installation This Trojan drops the following
This is the Trend Micro detection for files that exhibit certain behaviors. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Installation This Trojan drops the following files: %User Temp%
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan does the following: It loads and runs the file C:\Windows\system32
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Other
The URL and LNK files this worm drops point to ttp://www.sfc007.com/ . This worm arrives via removable drives. It arrives by accessing affected shared networks. It drops copies of itself into network
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It modifies the Internet
Other System Modifications This Trojan deletes the following files: %System%\Verclsid.exe (Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This worm drops the following files: %User Temp%
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. It checks for the presence of the following processes
This dialer dials premium-rate numbers. The charges are billed to the computer owner unknowingly. Dialer Routine This dialer dials premium-rate numbers. The charges are billed to the computer owner
This worm arrives by connecting affected removable drives to a system. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
This is the Trend Micro detection for files that exhibit certain behaviors. NOTES: Other Details This is the Trend Micro detection for: PHP scripts in compromised Web servers that wait for a
This backdoor monitors the browsing activities of the user and logs keystroke when the user is accessing sites with certain strings. This backdoor arrives on a system as a file dropped by other
This backdoor may be dropped by other malware. Arrival Details This backdoor may be dropped by other malware. Other System Modifications This backdoor adds the following registry keys:
This is the Trend Micro detection for files infected by PE_VIRUX.Q through the insertion of a certain IFRAME tag. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
It takes advantage of the Excel Featheader Record Memory Corruption Vulnerability. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious
Other Details This backdoor does the following: It is a PHP script that is a component of a PHP backdoor malware. It sends the string, FeelCoMz to a remote site to notify a hacker that a site has