Keyword: usojan.win32.disttrack.aa
74424 Total Search   |   Showing Results : 21 - 40
DISTTRACK, also known as Shamoon , is known for infecting the Master Boot Record (MBR) and overwriting files. Accordingly, once these files are overwritten, users cannot open or restore thir access.
DISTTRACK, also known as Shamoon , is known for infecting the Master Boot Record (MBR) and overwriting files. Accordingly, once these files are overwritten, users cannot open or restore thir access.
This Trojan drops a component that overwrites disk partitions. It renders the computer unusable after reboot. It is also used by TROJ_DISTTRACK.C when reporting to its C&C server. This Trojan may be
This Trojan is responsible for sending information about the infection back to its server. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: WORM_DISTTRACK.D Installation This Trojan drops the following files: %Windows%\inf
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: WORM64_DISTTRACK.D Installation This Trojan drops the following files: %Windows%\inf
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: WORM_DISTTRACK.C Other Details This Trojan does the following: It is responsible for
Description Name: DISTTRACK - HTTP (Request) - Variant 2 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some...
Description Name: DISTTRACK - HTTP (Request) - Variant 3 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some...
Description Name: DISTTRACK - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators ...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
\TURKISH.TXT %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\Mac\UKRAINE.TXT %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\CP1250.TXT %Program Files%\Adobe