Search

Results 1-10 of 13 matches. (0.03 seconds)
1. Trojan.Spy.ZBot.EHE
...p; This is another version of ZBot which is spammed via e-mail containing an attachment or a link to the malware.    When executed it will decrypt and inject its code into winlogon.exe and into svchost.exe therefore being able to create files or acc...

2. Trojan.Spy.ZBot.UO
... layer we can find Trojan.Spy.ZBot.UI . The virus injects code into winlogon.exe allowing it to create files or connect to the internet undetected and run on the computer without the knowledge of the user. It copies itself to      %WINDIR%\syst...

3. Trojan.Spy.ZBot.EH
...At execution this malware is a trojan that copies itself in %WINDIR%\system32\ntos.exe (or C:\Documents and settings\%username%\Application Data\) and he will create a registry key in order to make sure it will be executed after every reboot.He will inject in svch...

4. Trojan.Spy.Zbot.KJ
... by BitDefender as Trojan.Spy.Zbot.JM.He will inject in svchost.exe and winlogon.exe imediately after execution and he can provide backdoor and proxy server capabilities. The service provided through svchost.exe listens at a random TCP port that is opened enabling...

5. Trojan.Spy.ZBot.VG
...;   This version of ZBot is another encrypted version of Trojan.Spy.ZBot.UI.     It spreads itself through spam e-mail having the subject "Who killed Michael Jackson?". The e-mail contains a link to the following address hxxp://m...

6. Trojan.Spy.ZBot.EPU
...         At execution this malware creates a folder with a random name in "%Documents and Settings%\%user name%\Application Data\" and then copies itself in the newly created folder under a new random name(e.g.:"...

7. Trojan.Spy.ZBot.EKG
...This trojan spreads via infected web-sites, where it can be downloaded and executed directly on a system via an exploit, or the user can be tricked into downloading and running it manually.When executed, the trojan will first create a mutex named "_AVIRA_2109...

8. Trojan.Spy.ZBot.EKF
...This trojan spreads via infected web-sites, where it can be downloaded and executed directly on a system via an exploit, or the user can be tricked into downloading and running it manually.When executed, the trojan will first create a mutex named "_AVIRA_2109...

9. Trojan.Spy.Zeus.W
...The malware has the icon of a *.chm file ( Microsoft Compiled HTML Help File ). This technique is used as a social engineering method  to trick the user to launch the infection. The file is usualy send as an attachment with spam email.  The malware comes...

10. Trojan.FakeAlert.Gen.2
...     Trojan.FakeAlert.Gen.2 detects downloaders and installers of various rogue antiviruses such as XPAntivirus, Vista Antivirus, Antivirus 2008, Antivirus 2009, etc.    Rogue antiviruses are software products which once installe...

Pages: 1 2 Next