Keyword: trojan spyware
300 Total Search   |   Showing Results : 221 - 240
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.It does not have any propagation routine.It does not have any bac...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.It does not have any propagation routine.It does not have any bac...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system. It con...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information.
This Trojan encrypts files. When a user clicks on an encrypted file, the following image is displayed:This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It us...
This Trojan may be downloaded by other malware/grayware/spyware from remote sites.It modifies the Internet Explorer Zone Settings.It connects to certain websites to send and receive information.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites.It modifies the Internet Explorer Zone Settings.It connects to certain websites to send and receive information.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites.It modifies the Internet Explorer Zone Settings.It connects to certain websites to send and receive information.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites.It modifies the Internet Explorer Zone Settings.It connects to certain websites to send and receive information.
This Trojan may be dropped by other malware.It executes commands from a remote malicious user, effectively compromising the affected system.It gathers information and reports it to its servers.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.It gathers ...
This Trojan does not have any propagation routine.It does not have any backdoor routine.It connects to certain websites to send and receive information. However, as of this writing, the said sites are inaccessible. It gathers information and reports...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It retrieves specific information from the affected system.