Keyword: clicker
308 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan Clicker arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Clicker arrives on a
This Trojan Clicker arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Clicker arrives on a
Description Name: CLICKER - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of...
SOPICLICK is used a clicker in pay-per-click online advertisements. This Trojan connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to
SOPICLICK is used a clicker in pay-per-click online advertisements. This Trojan connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to
\tdssdata It adds the following registry entries: HKEY_LOCAL_MACHINE\software\TDSS build = "standart" HKEY_LOCAL_MACHINE\software\TDSS type = "clicker" HKEY_LOCAL_MACHINE\software\TDSS affid = "20
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It does not have
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan, when executed, drops non-malicious files onto the infected system. It also sets attributes of its dropped .LNK files to Read-only . Installation This Trojan drops the following
This Trojan bears the file icons of certain applications to avoid easy detection and consequent removal. It connects to a website to send and receive information. Installation This Trojan drops the
Installation This Trojan drops the following component file(s): %Startup%\ .jse %Windows%\Survival_0.txt (Note: %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.) Autostart
This Trojan connects to a non-malicious URL. It does this periodically every ten minutes. It may do this to possibly collect per-click advertising payments. This Trojan arrives on a system as a file