Keyword: os2first
41756 Total Search   |   Showing Results : 621 - 640
PRORAT is a family of backdoors that serves as a remote administration tool (RAT). Variants of this malware family first appeared in 2005. It opens random ports to establish connection with a remote
%System%\utntweep.dll" The DLL component contains the backdoor payload of the malware. This DLL first checks if it is injected in any of the following processes before continuing execution: explorer.exe
sites serving malware. QAKBOT was first spotted in 2007. Its main function is to steal information. The information it steals are primarily related to finance-based institutions. It also steals system
component first checks if it is injected in any of the following processes before continuing execution: explorer.exe firefox.exe lsvchost.exe msimn.exe msnmsgr.exe netscp.exe opera.exe outlook.exe safari.exe
PRORAT is a family of backdoors that serves as a remote administration tool (RAT). Variants of this malware family first appeared in 2005. It opens random ports to establish connection with a remote
spamming components and download components are being detected as Trojans. The first STRAT variant was spotted in 2006. STRAT's purpose is to release numerous variants in the wild to create an outbreak.
DisplayName = "QuestScan 1.0 build 126 powered by FIRST SEARCHBAR" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ QuestScan UninstallString = "%Program Files%\QuestScan\uninstall.exe _
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
sites serving malware. QAKBOT was first spotted in 2007. Its main function is to steal information. The information it steals are primarily related to finance-based institutions. It also steals system
spamming components and download components are being detected as Trojans. The first STRAT variant was spotted in 2006. STRAT's purpose is to release numerous variants in the wild to create an outbreak.
PRORAT is a family of backdoors that serves as a remote administration tool (RAT). Variants of this malware family first appeared in 2005. It opens random ports to establish connection with a remote
sites serving malware. QAKBOT was first spotted in 2007. Its main function is to steal information. The information it steals are primarily related to finance-based institutions. It also steals system
This worm executes the files it drops, prompting the affected system to exhibit the malicious routines they contain. Arrival Details This worm may arrive via network shares. Installation This worm
This worm uses the default Windows folder icon to trick users into opening the file. Double-clicking the file executes this malware. It modifies registry entries to hide files with System and
Bank & Trust Bank of America CareerBuilder Chase Columbia Bank Comerica Danversbank First Citizens Bank Huntington Business Online Kariera OSPM PNC RaboBank Santander SecureInternetBank State Employees
This Trojan may be downloaded from remote sites. It posts messages on the affected user's Facebook wall. These messages contain links that include an instruction about the Facebook credits glitch.
Files with infection marker It also infects script files by first checking if the target script file's extension name is any of the following: .ASP .HTM .PHP Once it finds target script files, it creates
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It adds certain registry entries to disable the Task
}ine.ru/config.txt It executes two instances of itself with the following intention: The first process executes its auto-start and coin mining function. The second process executes its anti-analysis and anti-debugging