Search
Keyword: usoj_rovnix.pc
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be unknowingly
password pat patrick pc pussy pw pw123 pwd qq520 qwer qwerty root server sex shadow super sybase temp temp123 test test123 win xp xxx yxcv zxcv Backdoor Routine This file infector connects to the following
scon.exe It does the following: Posts information about the affected system to the URL http://{BLOCKED}.ha.cn:81/admin/count.php Posted information include: MAC address, PC type, antivirus name Executes the
from the following FTP clients: 32bit FTP AceBIT BitKinex Bullet Proof FTP COREFTP Classic FTP PC Coffeecup CuteFTP Directory Opus ExpanDrive FAR FTP Commander FTP Control FTP Explorer FTP Navigator FTP
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
\boot.ini, %System%\dllcache\userinit.exe and %System%\userinit.exe, and forcefully restarts the PC (Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This worm executes the files it drops, prompting the affected system to exhibit the malicious routines they contain. Arrival Details This worm may arrive via network shares. Installation This worm
enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Windows PC Driver = %User Profile%\Application Data\Realhost.exe HKEY_LOCAL_MACHINE
This is the Trend Micro detection for files that exhibit certain behaviors. Other Details This is the Trend Micro detection for: Files targeting Trend Micro OfficeScan Corporate Edition (OSCE)
updated copy of itself, and where to send its stolen data. It attempts to steal information from the following banks and/or other financial institutions: CIBCOnline Coast Capital Savings HSBC OSPM PC
Messenger My Space IM Napster Odigo Messenger Opera PalTalk Pandion PC Remote Control Pidgin Poco Mail Pop Peeper PSI QIP Remote Desktop Connections RimArts Becky! Internet Mail Scribe Mail SecureFX SmartFTP
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be unknowingly
This worm uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of of
This Trojan arrives as a component bundled with malware/grayware packages. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to