Keyword: usojan backdoor
18005 Total Search   |   Showing Results : 101 - 120
This backdoor may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It terminates itself if
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It connects to a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It listens on ports. Arrival Details This Backdoor
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor may be dropped by other malware. Arrival Details This backdoor may be dropped by other malware. Installation This backdoor drops the following files: %System%\update.dll (Note: %System%
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. However, as
This backdoor may be downloaded by other malware/grayware from remote sites. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It logs a user's keystrokes to steal information. It
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It opens a hidden Internet Explorer
This backdoor may be dropped by other malware. It deletes itself after execution. Arrival Details This backdoor may be dropped by the following malware: TROJ_ADOBFP.SM Installation This backdoor
This backdoor connects to a website to send and receive information. Installation This backdoor drops the following files: %Program Files%\Windows Media Player\wupdmgr32.dll %Windows%\ThankU.txt
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This backdoor arrives as an attachment to email messages spammed by
This backdoor connects to a website to send and receive information. Arrival Details This backdoor may be downloaded from the following remote sites: metigovjpmailsattfile.{BLOCKED}w.com Installation
This Backdoor may arrive bundled with malware packages as a malware component. It connects to certain websites to send and receive information. Arrival Details This Backdoor may arrive bundled with
This Backdoor listens on port(s). It connects to a website to send and receive information. Arrival Details This Backdoor may be downloaded from the following remote site(s): {BLOCKED}.{BLOCKED