Keyword: kazaa
92 Total Search   |   Showing Results : 21 - 40
\\edonkey2000\incoming\ %Program File%\\emule\incoming\ %Program File%\\grokster\my grokster\ %Program File%\\icq\shared folder\ %Program File%\\kazaa lite k++\my shared folder\ %Program File%\\kazaa lite\my
Potter.exe %Program Files%\Common Files\Microsoft Shared\DW\1031\Kazaa Lite.com %Program Files%\Common Files\Microsoft Shared\DW\1033\Winamp 5.0 (en).ShareReactor.com %Program Files%\Common Files\Microsoft
\emule\incoming\ %Program Files%\grokster\my grokster\ %Program Files%\icq\shared folder\ %Program Files%\kazaa lite k++\my shared folder\ %Program Files%\kazaa lite\my shared folder\ %Program Files%\kazaa
FILES\ADOBEUPDATE.EXE %Program Files%\KAZAA LITE\MY SHARED FOLDER\SEX_SCREENSAVER.SCR %Program Files%\KAZAA LITE\MY SHARED FOLDER\Sex_Game.exe %Program Files%\Kazaa\MY SHARED FOLDER\SEX_SCREENSAVER.SCR
%User Temp%\tmp4.tmp %Program Files%\Common Files\Microsoft Shared\index.com %Program Files%\Common Files\Microsoft Shared\DAO\Kazaa Lite.com %Program Files%\Common Files\Microsoft Shared\DW
" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Systemappl = "cscss.exe" Propagation This worm drops copies of itself into the following folders used in peer-to-peer (P2P) networks: kazaa\my shared
dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This worm creates the following folders: %Program Files%\Kazaa\My Shared Folder (Note:
\shared folder\ kazaa lite k++\my shared folder\ kazaa lite\my shared folder\ kazaa\my shared folder\ limewire\shared\ morpheus\my shared folder\ tesla\files\ winmx\shared\ It drops the following copy(ies)
copies of itself into the following folders used in peer-to-peer (P2P) networks: my shared folder download ftp htdocs http upload shar icq bear lime morpheus donkey mule kazaa shared files It uses the
following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Explorer\Run Kazaa = "%Application Data%\csrss.exe
copies of itself into the following folders used in peer-to-peer (P2P) networks: %Program files%\Kazaa\My Shared Folder C:\Kazaa\My Shared Folder C:\My Downloads %Program files%\KaZaA Lite\My Shared Folder
\ C:\program files\kazaa lite k++\my shared folder\ C:\program files\kazaa lite\my shared folder\ C:\program files\kazaa\my shared folder\ Download Routine This Trojan connects to the following website(s
Shared\Triedit\index.ShareReactor.com %Program Files%\Common Files\Microsoft Shared\VC\Kazaa Lite.ShareReactor.com %Program Files%\Common Files\Microsoft Shared\VGX\Kazaa Lite.ShareReactor.com %Program
filename} = "{malware path and filename}:*:Enabled:service" Propagation This worm drops copies of itself into the following folders used in peer-to-peer (P2P) networks: %Program Files%\Kazaa\MY SHARED FOLDER
%Program Files%\icq\shared folder\ %Program Files%\kazaa lite k++\my shared folder %Program Files%\kazaa lite\my shared folder %Program Files%\kazaa\my shared folder %Program Files%\limewire\shared\ %Program
drops copies of itself into the following folders used in peer-to-peer (P2P) networks: BearShare iMesh Shareaza Kazaa DC++ eMule It drops an AUTORUN.INF file to automatically execute the copies it drops
adds the following registry keys: HKEY_CURRENT_USER\Software\eMule HKEY_CURRENT_USER\Software\Kazaa\ LocalContent HKEY_CURRENT_USER\Software\iMesh\ iMesh5\Transfer HKEY_CURRENT_USER\Software\Shareaza
copies of itself into the following folders used in peer-to-peer (P2P) networks: BearShare iMesh Shareaza Kazaa DC++ eMule LimeWire
Based on analysis of the codes, it has the following capabilities: Proliferates through the following P2P applications: BearShare iMesh Shareaza Kazaa DC++ eMule LimeWire Kaspersky:
%System%\dtveazkj\Macromedia Flash MX.exe %System%\dtveazkj\Macromedia Flash 5.exe %System%\dtveazkj\Kazaa advertisement remover.exe %System%\dtveazkj\Kazaa ad remover.exe %System%\dtveazkj\Max Payne