Keyword: atmos.1070-c
300 Total Search   |   Showing Results : 141 - 160
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
First SYKIPOT variants were spotted in 2007. These backdoors are usually dropped by other malware exploiting vulnerabilities.SYKIPOT backdoors steal the following information, which it sends to its C&C server:Active network connectionsAdapter informa...
First SYKIPOT variants were spotted in 2007. These backdoors are usually dropped by other malware exploiting vulnerabilities.SYKIPOT backdoors steal the following information, which it sends to its C&C server:Active network connectionsAdapter informa...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the Internet Explorer Zone Settings.However, due to errors in its code, it fails to perform it...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It hides files, processes, and/or registry entries.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses Windows Task Scheduler to create a scheduled task that executes the dropped copy.It connects to cer...
This worm may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It may create registry entries under a certain registry key.It drops an AUTORUN.INF file to automatically execute the copies it d...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Windows 2000, Windows XP, Windows Server 2003 InstallationThis worm drops the following copies of itself into the affected system: %User Profile%\Application Data\Microsoft\conhost.exe(Note: %User Profile% is the current user's prof...
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies files, disabling programs and applications from properly running.
Trend Micro has flagged this worm as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it deletes important files that are needed during system bootup.To get a one-glance comprehensive view o...
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.