Keyword: trojan backdoor
79319 Total Search   |   Showing Results : 2201 - 2220
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It executes
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It executes commands from a remote malicious user, effectively compromising the affected system. It connects
registry keys: HKEY_CLASSES_ROOT\‚”#˜‚ Backdoor Routine This Trojan does not have any backdoor routine. Download Routine This Trojan connects to the following URL(s) to download its component file(s): u.
64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.) Propagation This Trojan does not have any propagation routine. Backdoor Routine This Trojan
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It
following processes: svchost.exe It injects codes into the following process(es): created svchost.exe Propagation This Trojan does not have any propagation routine. Backdoor Routine This Trojan does not have
processes: svchost.exe It executes then deletes itself afterward. It injects codes into the following process(es): created svchost.exe Propagation This Trojan does not have any propagation routine. Backdoor
= %System%\Down(0).exe Backdoor Routine This Trojan connects to the following websites to send and receive information: {BLOCKED}.{BLOCKED}.149.46 As of this writing, the said sites are inaccessible.
malicious sites. Backdoor Routine This Trojan connects to the following websites to send and receive information: http://{BLOCKED}.{BLOCKED
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Backdoor Routine This Trojan connects to the following URL(s) to send and receive commands from a
This Trojan may be downloaded by other malware/grayware from remote sites. It does not have any propagation routine. It requires its main component to successfully perform its intended routine. This
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It executes commands from a remote malicious user, effectively compromising the affected system. It connects
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details