Keyword: trojan backdoor
79324 Total Search   |   Showing Results : 2521 - 2540
{BLOCKED}.132.238 This report is generated via an automated analysis system. RDN/Generic BackDoor (McAfee); W32.Golroted (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse Generic18_c.BQAS (AVG)
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It does not have any propagation routine. It does not have any backdoor routine. It modifies the Internet Explorer
This Trojan may be downloaded from remote sites by other malware. It does not have any propagation routine. It does not have any backdoor routine. It modifies the Internet Explorer Zone Settings. It
have any backdoor routine. It terminates itself if it detects it is being run in a virtual environment. It gathers information and reports it to its servers. Arrival Details This Trojan arrives on a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It runs
have any backdoor routine. It does not have any downloading capability. It connects to certain websites to send and receive information. Arrival Details This Trojan arrives on a system as a file dropped
propagation routine. Backdoor Routine This Trojan does not have any backdoor routine. Dropping Routine This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan Spy arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine.
not have any backdoor routine. It steals certain information from the system and/or the user. Arrival Details This Trojan Spy arrives on a system as a file dropped by other malware or as a file
Profile%\Application Data\{random folder name}\{random file name}.exe" Propagation This Trojan does not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor routine.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives via peer-to-peer (P2P) shares. It arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This backdoor arrives via peer-to-peer (P2P) shares. It arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This backdoor arrives via peer-to-peer (P2P) shares. It arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
Trojan:Win32/Dynamer!ac (Microsoft); RDN/Generic BackDoor (McAfee); Trojan.Win32.Inject.vdbd (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse Generic_r.EZI.dropper (AVG)