Keyword: troj strtpage.be
55699 Total Search   |   Showing Results : 681 - 700
number. This Trojan may be hosted on a website and run when a user accesses the said website. It may be manually installed by a user. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It uses common file icons to trick a user into thinking that the files are legitimate.
folders using a certain file name. Trend Micro detects the dropped AUTORUN.INF file as TROJ_OTORUN.SMF. This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from
Threat Diagram shown below. This is Trend Micro's detection for a specially-crafted .PDF file that exploits a vulnerability in Adobe Reader , specifically its U3D component to be able to drop and execute
This Trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it takes advantage
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a result, malicious routines of the
This Trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of
This Trojan may arrive bundled with malware packages as a malware component. It may be unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run when a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It adds certain registry entries to disable the Task Manager. This
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It uses the default Windows folder icon to trick users into opening the
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It adds certain registry entries to disable the Task Manager. This
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It is a specially crafted PDF file
The Wirelurker malware was seen affecting both OS X and iOS devices. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan may be
services. This action prevents most of the system functions to be used. It connects to certain websites to send and receive information. Arrival Details This Trojan arrives on a system as a file dropped by
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It connects to
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the dropped file(s). As a result, malicious routines of the
This Trojan may be dropped by other malware. It may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. It may be dropped by the following malware:
It drops and executes a file detected by Trend Micro as TROJ_RENOS.AYB. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a result, malicious routines of the