Keyword: TROJ_AGENT
49012 Total Search   |   Showing Results : 881 - 900
This backdoor may be dropped by other malware. It does not have any propagation routine. It connects to a website to send and receive information. However, as of this writing, the said sites are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It may be
It gathers certain information on the affected computer. This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This backdoor may be dropped by other malware. Arrival Details This backdoor may be dropped by the following malware: TROJ_DROPPER.TD Backdoor Routine This backdoor opens the following port(s) where
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager,
routine: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ 5.0\User Agent HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ User Agent
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan drops files detected as BKDR_COSMU.KO. It modifies registry entry(ies) as part of its installation routine. It then installs the dropped DLL component as service by creating registry
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
\ 5.0\User Agent It adds the following registry entries: HKEY_CLASSES_ROOT\Software\Microsoft\ Internet Explorer\SearchScopes URL = http://findgala.com/?&uid=2116&q={searchTerms} HKEY_CURRENT_USER
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious