Keyword: usojan.linux.cve20165195.c
300 Total Search   |   Showing Results : 121 - 140
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It attempts to access certain websites. However, the websites are inaccessible as of this writing.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.It modifies the Internet Explorer Zone Settings.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware encrypts files with specific file extensions. It drops files as ransom note.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
First SYKIPOT variants were spotted in 2007. These backdoors are usually dropped by other malware exploiting vulnerabilities.SYKIPOT backdoors steal the following information, which it sends to its C&C server:Active network connectionsAdapter informa...
First SYKIPOT variants were spotted in 2007. These backdoors are usually dropped by other malware exploiting vulnerabilities.SYKIPOT backdoors steal the following information, which it sends to its C&C server:Active network connectionsAdapter informa...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the Internet Explorer Zone Settings.However, due to errors in its code, it fails to perform it...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It hides files, processes, and/or registry entries.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses Windows Task Scheduler to create a scheduled task that executes the dropped copy.It connects to cer...
This worm may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It may create registry entries under a certain registry key.It drops an AUTORUN.INF file to automatically execute the copies it d...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Windows 2000, Windows XP, Windows Server 2003 InstallationThis worm drops the following copies of itself into the affected system: %User Profile%\Application Data\Microsoft\conhost.exe(Note: %User Profile% is the current user's prof...