Keyword: usoj_dropper.zgd
4990 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan executes the files it drops, prompting the affected system to exhibit the malicious routines they contain. Arrival Details This Trojan may be downloaded from the following remote sites:
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
TROJ_VBINJECT.XG sends gathered information from an infected system to this URL via HTTP POST. This malware arrives as a malicious file dropped by TROJ_DROPPER.ZGD, which masquerades as a Facebook
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_DROPPER.ZGD Installation This Trojan drops the following copies of itself into
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It deletes itself after execution. Arrival Details This Trojan may be
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It arrives as a component bundled with malware/grayware packages. It may be dropped by other malware. It is
This spyware may be downloaded by other malware/grayware from remote sites. It logs a user's keystrokes to steal information. Arrival Details This spyware may be downloaded by the following
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_ARTIEF.LOG Installation This Trojan drops the following component file(s): %User
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This spyware may be dropped by other malware. It attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan Spy may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting