Where to Buy Trend Micro Products

For Home

For Small Business

1-888-762-8736
(M-F 8:00am-5:00pm CST)

For Enterprise

1-877-218-7353
(M-F 8:00am-5:00pm CST)

Not in the United States?
Select the country/language of your choice:

Asia Pacific Region

Europe

The Americas

Not in the United States?
Select the country/language of your choice:

Asia/Pacific

Europe

America

Login

For Home

For Business

For Partners

Search

 

Keyword: RTKT_FARFLI.UW
8 Total Search   |   Showing Results : 1 - 8
     
Alias:No Alias FoundDescription:This others virus has been renamed to HKTL_TCPAGENT.
...downloaded from remote sites by other malware. It drops files, including one that is detected by Trend Micro as RTKT_FARFLI.UW. As a result, routines of the dropped files are also exhibited on the affected system. It registers itself as...
...itself to run on safe mode. It opens ports where it listens for remote commands. It connects to IRC servers. These routines effectively compromise the affected system's security. It drops a file detected by Trend Micro as RTKT_FARFLI.UW.
...registry entries to enable its automatic execution at every system startup. It creates registry key(s)/entry(ies) as part of its installation routine. It also creates keys. It also drops files detected by Trend Micro as RTKT_FARFLI.UW.
...vulnerability to propagate. More information about this vulnerability can be found in the following Microsoft Web page: Microsoft Security Bulletin MS08-067 It uses drops component detected as RTKT_FARFLI.UW to execute certain routines.
...when the drives are accessed. It connects to IRC servers. It opens random port(s). It drops a file detected as RTKT_FARFLI.UW. It then executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on...
...connects to IRC servers. It opens a random port(s). It drops files. Trend Micro detects the dropped file as RTKT_FARFLI.UW. As a result, routines of the dropped rootkit are also exhibited on the affected system.
...in all removable drives. It drops an AUTORUN.INF file to automatically execute dropped copies when the drives are accessed. It connects to IRC servers. It opens a random port(s). It drops component files detected as RTKT_FARFLI.UW.
8 Total Search   |   Showing Results : 1 - 8
     

Connect with us on