Keyword: usoj_evadiped.am
1073 Total Search   |   Showing Results : 1 - 20
   Next  
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
It monitors specific URLs. If users access these monitored sites, they are redirected by this malware to specific malicious sites. This Trojan may be dropped by other malware. Arrival Details This
This malware checks for specific running processes in the affected system. It connects to specific URLs in order to download malicious files. This Trojan may be downloaded by other
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CLASSES_ROOT\CLSID\{AFD4AD01-58C1-47DB-A404-FBE00A6C5486}
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CLASSES_ROOT\CLSID\{AFD4AD01-58C1-47DB-A404-FBE00A6C5486}
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It may be injected into processes running in memory. It requires its main component to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan connects to URLs to download other possibly malicious files and configuration files. It checks and reports to the URLs if certain processes are running on the system. This Trojan may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It does not have any
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
Reader\10.0\Installer\ Migrated It adds the following registry entries: HKEY_CURRENT_USER\Software\DC3_FEXEC 6/5/2014 at 12:11:19 AM = "{1c6961c0-f82d-11e0-a6bd-806d6172696f-1756172240}" HKEY_CURRENT_USER
\DC3_FEXEC 4/17/2014 at 2:32:41 AM = "{1c6961c0-f82d-11e0-a6bd-806d6172696f-1756172240}" HKEY_CURRENT_USER\Software\DC3_FEXEC 4/17/2014 at 2:32:46 AM = "{1c6961c0-f82d-11e0-a6bd-806d6172696f-1756172240}
\SOFTWARE\LabTech\ Service Server Address = "lts.fortressnetworks.com" HKEY_LOCAL_MACHINE\SOFTWARE\LabTech\ Service\Settings UpdateTime = "1/23/2007 9:00:00 AM" HKEY_LOCAL_MACHINE\SOFTWARE\LabTech\ Service
following registry keys: HKEY_CURRENT_USER\Software\DC3_FEXEC It adds the following registry entries: HKEY_CURRENT_USER\Software\DC3_FEXEC 11/10/2014 at 3:14:41 AM = "
7.) It adds the following registry keys: HKEY_CURRENT_USER\Software\DC3_FEXEC It adds the following registry entries: HKEY_CURRENT_USER\Software\DC3_FEXEC 6/18/2014 at 7:16:17 AM = "
\svchost.exe,explorer.exe" HKEY_CURRENT_USER\Software\DC3_FEXEC 4/30/2015 at 12:07:50 AM = "{1c6961c0-f82d-11e0-a6bd-806d6172696f-1756172240}" HKEY_CURRENT_USER\Software\DC3_FEXEC 4/30/2015 at 12:07:57 AM = "
\svchost.exe,explorer.exe" HKEY_CURRENT_USER\Software\DC3_FEXEC 4/7/2015 at 5:47:30 AM = "{1c6961c0-f82d-11e0-a6bd-806d6172696f-1756172240}" HKEY_CURRENT_USER\Software\DC3_FEXEC 4/7/2015 at 5:47:41 AM = "
\Microsoft\ Windows NT\CurrentVersion\Winlogon shell = "%User Temp%\Windows\filename.exe,explorer.exe" HKEY_CURRENT_USER\Software\DC3_FEXEC 4/20/2015 at 2:23:07 AM = "
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system