Keyword: usojan backdoor
18005 Total Search   |   Showing Results : 81 - 100
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It connects to a website to send and receive information. Arrival Details
It modifies the HOSTS file to delete all entries. This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other
This backdoor may be dropped by TROJ_DROPPER.ADO. When executed, it executes commands from a remote malicious user to start or stop services, list processes and services, get system information and
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This backdoor is related to a possible targeted attack. This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a hidden Internet Explorer window. It
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It connects to a website to send and receive information. Arrival Details This backdoor may be unknowingly
This backdoor may be dropped by other malware. It connects to a website to send and receive information. Arrival Details This backdoor may be dropped by the following malware: TROJ_XLSDRP.C
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a hidden Internet Explorer window. It deletes
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not