Keyword: trojan backdoor
79324 Total Search   |   Showing Results : 2481 - 2500
adding the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\{Random} Imagepath = %UserTemp%\{random}.tmp Backdoor Routine This Trojan connects to the following websites to
users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages. Backdoor Routine This Trojan Spy connects to the following websites to send and receive information:
Backdoor Routine This Trojan executes the following commands from a remote malicious user: Execute remote shell It connects to the following websites to send and receive information: www.{BLOCKED
system. Trojan:Win32/Skeeyah.A!bit (Microsoft); RDN/Generic BackDoor (McAfee); Backdoor.Win32.Androm.hkxi (Kaspersky); Mal/EncPk-CK (Sophos); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse Inject2.CLNV
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This malware is involved in certain targeted attacks that took place on March 2013. It drops and opens non-malicious document files to hide its backdoor routines. Users affected by this malware may
Details This backdoor deletes itself after execution. Backdoor.Korplug (Norton), Backdoor.Win32.Gulpix (Ikarus), Win32/Korplug.AT trojan (NOD32) Dropped by other malware, Downloaded from the Internet
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
{All User's Profile}\Application Data\{random folder name}\{random file name}.ico,0" Propagation This Trojan does not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
Trojan does more than make a statement against piracy. How does the malware arrive on the users' Android smartphone? The Trojan, detected as ANDROIDOS_WALKINWAT.A , may be downloaded from third-party
2000, XP (32-bit), and Server 2003, or C:\Program Files (x86) on Windows XP (64-bit).) Propagation This Trojan does not have any propagation routine. Backdoor Routine This Trojan does not have any
This Trojan may be dropped by other malware. It does not have any propagation routine. It does not have any backdoor routine. It accesses websites to download files. This action allows this malware