Search
Keyword: browser hijacker
This Trojan registers the receivers BootReceiver and AlarmReceiver which are responsible for starting the service called MonitorService. This service communicates with the malicious server and obtains data needed to execute its payload.It installs a ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It attempts to steal sensitive online banking information, such as user names and passwords. This routine ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor may arrive contained inside a self extracting archive (RAR SFX) and attached in email messages. The SFX drops and executes this malware. The SFX also drops encrypted component files. Upon execution, it checks for the account user of the...
This backdoor may arrive contained inside a self extracting archive (RAR SFX) and attached in email messages. The SFX drops and executes this malware. The SFX also drops encrypted component files. Upon execution, it checks for the account user of the...
This backdoor may arrive contained inside a self extracting archive (RAR SFX) and attached in email messages. The SFX drops and executes this malware. The SFX also drops encrypted component files. Upon execution, it checks for the account user of the...
This backdoor may be downloaded by other malware/grayware from remote sites.It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.It gathers certain ...
This is a ransomware scam that pretends to be a threatening message from Scotland Yard but actually hijacks the user's computer and demands money to unlock it.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat ...
This malware arrives as an attachment in an email supposedly from the Better Business Bureau. Once launched, this malware attempts to steal sensitive information. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Th...
Windows 98, ME, NT, 2000, XP, Server 2003
Other System ModificationsThis Trojan adds the following registry keys: Other DetailsThis Trojan adds the following lines or registry entries as part of its routine: HKEY_LOCAL_MACHINE\SOFT...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to a website to send and receive information.
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information.It encrypts files with specific file ex...
This malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the system.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the Internet Explorer Zone Settings.It deletes itself after execution.