Keyword: trojan backdoor
79326 Total Search   |   Showing Results : 2681 - 2700
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It does not have
This backdoor may be dropped by other malware. It adds registry entries to enable its automatic execution at every system startup. It opens a hidden Internet Explorer window. Arrival Details This
This backdoor opens a hidden Internet Explorer window. It attempts to access certain websites. However, the websites are inaccessible as of this writing. Installation This backdoor drops the
This backdoor opens a hidden Internet Explorer window. It deletes itself after execution. Other System Modifications This backdoor adds the following registry keys: HKEY_CURRENT_USER\Software\Local
This backdoor may be dropped by other malware. Arrival Details This backdoor may be dropped by the following malware: TROJ_DROPPER.TD Backdoor Routine This backdoor opens the following port(s) where
routine. Backdoor Routine This Trojan does not have any backdoor routine. Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Dropping Routine This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor opens a port on the infected computer. It does this to listen for remote connection. This backdoor arrives as an attachment to email messages spammed by other malware/grayware or
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor may be dropped by other malware. It connects to a website to send and receive information. It creates an event. Arrival Details This backdoor may be dropped by the following malware:
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This malware arrives as a Gadhafi death video spam purporting to come from CNN. When executed, this backdoor sends specific information to the remote server. To get a one-glance comprehensive view of
This backdoor is capable of creating its own server components. Backdoor Routine This backdoor is capable of creating its own server components. Other Details This backdoor does the following: It
This backdoor arrives as a component bundled with malware/grayware packages. It opens a hidden Internet Explorer window. Arrival Details This backdoor arrives as a component bundled with
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor may arrive bundled with malware packages as a malware component. It requires its main component to successfully perform its intended routine. Arrival Details This backdoor may arrive
This backdoor connects to a website to send and receive information. Arrival Details This backdoor may be downloaded from the following remote sites: http://b.{BLOCKED