Keyword: trojan backdoor
79319 Total Search   |   Showing Results : 2381 - 2400
{e3df6b419d1F} HKEY_CURRENT_USER\Software\Google ActiveSettings = "{hex values}" Backdoor Routine This Trojan connects to the following websites to send and receive information: {BLOCKED}i.zyns.com
\ LightGame\Recent File List HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\ LightGame\Settings Backdoor Routine This Trojan connects to the following websites to send and receive
\ Enum\Root\LEGACY_RBPQHVFC HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\rBpqhvFC Backdoor Routine This Trojan connects to the following websites to send and receive information: saber1991.
Agent @ = {user agent information} HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System DisableTaskMgr = 1 Backdoor Routine This Trojan opens a hidden Internet Explorer window. It
registry entry is "Explorer.exe" .) Other System Modifications This Trojan adds the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ idid Backdoor Routine However, as of this writing, the said
This Trojan may be dropped by other malware. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan may be dropped by the following malware: WORM_PROLACO.XWG
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a