Keyword: gamarue
550 Total Search   |   Showing Results : 21 - 40
This backdoor modifies the Internet Explorer Zone Settings. It deletes itself after execution. Installation This backdoor drops the following copies of itself into the affected system: %ProgramData%
This worm arrives as attachment to mass-mailed email messages. It connects to certain websites to send and receive information. Arrival Details This worm arrives as attachment to mass-mailed email
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This backdoor modifies the Internet Explorer Zone Settings. It deletes itself after execution. Installation This backdoor drops the following copies of itself into the affected system: %All Users
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan may be dropped by other malware. It is a component of other malware. It exports functions used by other malware. It is used to load and execute a file. Arrival Details This Trojan may be
This backdoor modifies the Internet Explorer Zone Settings. It deletes itself after execution. Installation This backdoor drops the following copies of itself into the affected system: %All Users
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This backdoor modifies the Internet Explorer Zone Settings. It deletes itself after execution. Installation This backdoor drops the following copies of itself into the affected system: %All Users
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various system
This backdoor modifies the Internet Explorer Zone Settings. It deletes itself after execution. Installation This backdoor drops the following copies of itself into the affected system: %All Users
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It executes commands from a remote malicious
This worm may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected
This Trojan may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan may be dropped by other malware. It is a component of other malware. Arrival Details This Trojan may be dropped by the following malware: WORM_GAMARUE.LJG Installation This Trojan is a
This Trojan may be dropped by other malware. It is a component of other malware. Arrival Details This Trojan may be dropped by the following malware: WORM_GAMARUE.LJG Installation This Trojan is a
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially