- Jul 21, 2011
- 669
Backdoor related behavior
Spyware related behavior
HiJacker related behavior
Worm related behavior
Dialer related behavior
Keylogger related behavior
Trojan Downloader related behavior
Injection of code into other programs
Manipulation of programs (patching)
Invisible installations of software
Invisible Rootkit processes
Installation of services and drivers
Creation of Autostart entries
Manipulation of the Hosts file
Changes of the browser settings
Installation of debuggers on the system
Simulated mouse and keyboard activity
Direct disk sector access on harddisk
Changes of the system group policies
These are Mamutu's categories of suspicious/malicious behaviors. I know what some are ie: Creation of autostart entries writes to the autostart area in the registry etc but a lot of them are vague.
Anyone know what each one does? Either specifically or in a broad sense.
Spyware related behavior
HiJacker related behavior
Worm related behavior
Dialer related behavior
Keylogger related behavior
Trojan Downloader related behavior
Injection of code into other programs
Manipulation of programs (patching)
Invisible installations of software
Invisible Rootkit processes
Installation of services and drivers
Creation of Autostart entries
Manipulation of the Hosts file
Changes of the browser settings
Installation of debuggers on the system
Simulated mouse and keyboard activity
Direct disk sector access on harddisk
Changes of the system group policies
These are Mamutu's categories of suspicious/malicious behaviors. I know what some are ie: Creation of autostart entries writes to the autostart area in the registry etc but a lot of them are vague.
Anyone know what each one does? Either specifically or in a broad sense.