Details Tab Parent topic

This section describes how the threat behaves when executed. It includes the following information:
  • Registry modifications
  • File system modifications
  • Process modifications
  • Network activities
  • Backdoor routines
  • Information theft routines
Use this information together with the removal instructions in the Recommendation tab to restore affected systems. This section is either automatically generated or manually prepared by threat researchers.