Keyword: JS_SMALL
6012 Total Search   |   Showing Results : 561 - 580
Other Details This Backdoor adds the following lines or registry entries as part of its routine: %System%\bb.exe (Note: %System% is the Windows system folder, which is usually C:\Windows\System on
This Trojan may arrive bundled with malware packages as a malware component. It also has rootkit capabilities, which enables it to hide its processes and files from the user. Arrival Details This
This Backdoor connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the behavior of this
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the said sites are inaccessible. Arrival
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run
However, as of this writing, the said sites are inaccessible. Installation This Trojan creates the following folders: %Program Files%\Common Files\Plugins (Note: %Program Files% is the default
This Trojan may be downloaded unknowingly by a user when visiting malicious website(s). It opens a random port to allow a remote user to connect to the affected system. Once a successful connection
slave slick sliders small smart smile smiles smooch smother snach snafu snake snatch snoopy social socrates sodomy software somebody sondra sonia sonic sonya sossina source south spaceshi sparrows spear
This is the Trend Micro detection for files that exhibit certain behaviors. Installation This Trojan drops the following files: %System%\Iasex.dll - detected as BKDR_SMALL.LEC %System%
This hacking tool may arrive bundled with malware packages as a malware component. It may be unknowingly downloaded by a user while visiting malicious websites. It requires its main component to
This Trojan deletes itself after execution. Download Routine This Trojan connects to the following website(s) to download and execute a malicious file: http://{BLOCKED}.{BLOCKED}.73.203/548.exe -
Installation This Trojan adds the following folders: %System%\{random folder name} (Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This