Keyword: clicker
308 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan Clicker arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Clicker arrives on a
This Trojan Clicker arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Clicker arrives on a
Description Name: CLICKER - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of...
SOPICLICK is used a clicker in pay-per-click online advertisements. This Trojan connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to
SOPICLICK is used a clicker in pay-per-click online advertisements. This Trojan connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to
\tdssdata It adds the following registry entries: HKEY_LOCAL_MACHINE\software\TDSS build = "standart" HKEY_LOCAL_MACHINE\software\TDSS type = "clicker" HKEY_LOCAL_MACHINE\software\TDSS affid = "20
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It does not have
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor has received attention from independent media sources and/or other security firms. This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It arrives as a
Installation This Trojan drops the following component file(s): %Startup%\ .jse %Windows%\Survival_0.txt (Note: %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.) Autostart
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan connects to a non-malicious URL. It does this periodically every ten minutes. It may do this to possibly collect per-click advertising payments. This Trojan arrives on a system as a file
This Trojan connects to a non-malicious URL. It does this periodically every ten minutes. It may do this to possibly collect per-click advertising payments. This Trojan arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be injected into processes running in memory. It