Keyword: trojan backdoor
79326 Total Search   |   Showing Results : 2641 - 2660
This backdoor may be downloaded from remote sites by other malware. It connects to a website to send and receive information. Arrival Details This backdoor may be downloaded from remote site(s) by
This backdoor may arrive bundled with malware packages as a malware component. It is injected into all running processes to remain memory resident. It executes commands from a remote malicious user,
task that executes the copies it drops. It does not have any propagation routine. It does not have any backdoor routine. It deletes the initially executed copy of itself. Arrival Details This Trojan
the system's desktop wallpaper to the following image: Propagation This Trojan does not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor routine. Other Details This
program name in the system} = "%Application Data%\{random1}\{random2}.exe Propagation This Trojan does not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor routine.
This backdoor may be downloaded by other malware/grayware from remote sites. It does not have any propagation routine. It executes commands from a remote malicious user, effectively compromising the
This backdoor has received attention from independent media sources and/or other security firms. This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It arrives as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with
\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.) It adds the following processes: svchost.exe Backdoor Routine This Trojan connects to the following websites to
system. Arrival Details This Trojan may arrive bundled with malware packages as a malware component. It may be downloaded by other malware/grayware/spyware from remote sites. Backdoor Routine This Trojan is
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This backdoor opens random ports. It opens a hidden Internet Explorer window. Installation This backdoor drops the following copies of itself into the affected system: %WINDOWS%\WinSxS\winsxs.exe It
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor may be dropped by other malware. It connects to a website to send and receive information. It exports functions used by other malware. Arrival Details This backdoor may be dropped by
This Trojan comes as an attachment to spammed email. It carries with it a backdoor that runs on Mac OS X systems. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
(Note: The default value data of the said registry entry is Explorer.exe .) Backdoor Routine This Trojan connects to the following websites to send and receive information: http://{BLOCKED
application data for all users. This is usually C:\ProgramData in Windows Vista, 7, and 8.) Backdoor Routine This Trojan Spy connects to the following websites to send and receive information: https://bonus.
the user. Arrival Details This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Backdoor Routine This Trojan
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,