Search
Keyword: horse dialer
{random characters} This report is generated via an automated analysis system. Spammer:Win32/Tedroo.AA (Microsoft); Trojan Horse (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse SpamTool.EJC (AVG
Trojan Horse (Symantec); Trojan-Downloader.Win32.Banload.cvyb (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse Downloader.Banload2.VFL (AVG)
\Start Menu on Windows Vista and 7.) This report is generated via an automated analysis system. TrojanSpy:Win32/QQspy.2000 (Microsoft); QQSpy (McAfee); Trojan Horse (Symantec); Trojan-Spy.Win32.QQSpy.2000
{user name}\AppData\Roaming on Windows Vista and 7.) This report is generated via an automated analysis system. Trojan Horse (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse Agent_s.GI (AVG)
{BLOCKED}.117.207 It deletes itself after execution. This report is generated via an automated analysis system. TrojanDownloader:Win32/Drixed.A (Microsoft); RDN/Generic.dx!dgp (McAfee); Trojan Horse
WinHttp = "%User Profile%\Local Settings\WinHttp.exe" Troj/Inject-AVF (Sophos) ,Trojan horse Generic35.BYVV (AVG) ,W32/Inject.AVF!tr (Fortinet) ,Trojan.Win32.Inject.ihsh (Kaspersky) ,Trojan-FDTJ
{BLOCKED}9.34 It deletes itself after execution. This report is generated via an automated analysis system. Backdoor:Win32/Drixed.A (Microsoft); Trojan Horse (Symantec); Trojan.Win32.Yakes.gvct (Kaspersky);
http://www.{BLOCKED}terbar.com/images/chorome.exe {BLOCKED}4.156.103 {BLOCKED}.136.63 This report is generated via an automated analysis system. RDN/PWS-Banker!dn (McAfee); Trojan Horse (Symantec);
history It logs a user's keystrokes to steal information. Trojan-Cleaver (McAfee); Trojan Horse (Symantec); Trojan.MSIL.Zapchast.qobu (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse
the following possibly malicious URL: {BLOCKED}.70.69 This report is generated via an automated analysis system. Trojan:Win32/Dynamer!ac (Microsoft); Generic.ass (McAfee); Trojan Horse (Symantec);
and Server 2003, or C:\Users\{user name} on Windows Vista and 7.) This report is generated via an automated analysis system. Trojan:Win32/Sollru.A (Microsoft); Generic PWS.y!byq (McAfee); Trojan Horse
PWS:Win32/Zbot.PK (Microsoft); PWS-Zbot.dx (McAfee); Trojan Horse (Symantec); Worm.Win32.Pinit.gen (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse PSW.Generic7.ADKR (AVG)
Backdoor:Win32/IRCbot.gen!U (Microsoft); W32/Hamweq.worm.au (McAfee); Trojan Horse (Symantec); Net-Worm.Win32.Kolab.doe (Kaspersky); LooksLike.Win32.Malware!vb (v) (Sunbelt); Trojan horse Dropper.Generic.AVUK (AVG)
Generic VB.i (McAfee); Trojan Horse (Symantec); Net-Worm.Win32.Kolab.bde (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse Generic12.AZCH (AVG)
{BLOCKED}lo12.com/mert/aves.png This report is generated via an automated analysis system. TrojanDownloader:Win32/Banload.BCI (Microsoft); Trojan Horse (Symantec); Troj/Spy-ACP (Sophos); Trojan.Win32.Generic
URL: http://www.{BLOCKED}ire.com/?heqefu3rfds7hzl This report is generated via an automated analysis system. Trojan:Win32/Ircbrute (Microsoft); Trojan Horse (Symantec); Worm.Win32.Luder.aeaa (Kaspersky);
for Remote Desktop Connection. Trojan horse Dropper.Generic6.TXT (AVG) ,W32/Downloader_a.BX3!tr (Fortinet) ,Trojan.Win32.Spy (Ikarus) ,Backdoor.Win32.DarkHole.le (Kaspersky)
This report is generated via an automated analysis system. Trojan Horse (Symantec); Trojan.Win32.Agent.iber (Kaspersky); Trojan horse Downloader.Generic13.BJTF (AVG)
automated analysis system. TrojanSpy:Win32/Ursnif.gen!S (Microsoft); RDN/Generic PWS.y (McAfee); Trojan Horse (Symantec); Trojan.Win32.Inject.vdzv (Kaspersky); Troj/Agent-AOGH (Sophos); Trojan.Win32.Generic
); Trojan Horse (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse BackDoor.Generic_r.ZL (AVG)