Keyword: j2meredbrowa
41913 Total Search   |   Showing Results : 2381 - 2400
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It executes the downloaded files. As a result, malicious
This worm drops copies of itself into all the removable drives connected to an affected system. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to access certain websites. However, the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals certain information from the system and/or the
\CurrentVersion\Internet Settings\ Zones\1 1609 = "0" (Note: The default value data of the said registry entry is 1 .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\2 1609 =
Both malware are related to the modified Enfal variants, which were reported to have infected 874 systems in 33 countries. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It also has rootkit capabilities, which enables it to
This worm arrives via removable drives. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders in all physical and removable drives. It drops an AUTORUN.INF
This spyware injects a remote thread to all running processes except certain processes. It sends certain system information to its C&C server. It hooks APIs to aid in its malicious routines. It is
This Trojan may arrive bundled with malware packages as a malware component. It may arrive as a file that exports functions used by other malware. It arrives on a system as a file dropped by other
This spyware is the final payload of a massive Web page injection targeting osCommerce sites. It attempts to steal credit card information from the sites' potential customers. To get a one-glance
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
7.) Dropping Routine This spyware drops the following files: %User Temp%\aut1.tmp %User Temp%\j %User Temp%\aut5.tmp %User Temp%\incl1 %User Temp%\aut9.tmp %User Temp%\incl2 (Note: %User Temp% is the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded