Keyword: troj_small.edw
45098 Total Search   |   Showing Results : 41 - 60
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by
This Trojan may be dropped by other malware. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives as a file that exports the functions of other malware/grayware. It may be dropped by other malware. It connects to certain URLs. It may do this to remotely inform a malicious user
Installation This Trojan drops the following copies of itself into the affected system: %Program Files%\LMN.hta %Program Files%\Common Files\session\conlme.exe (Note: %Program Files% is the default
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is used to load and execute a file. Arrival Details
This Trojan arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It may be
This Trojan is a command line application which creates another file in the current directory using the file name specified as parameter. This Trojan may be unknowingly downloaded by a user while
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It connects
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan is a command line application which creates another file in the current directory using the file name specified as parameter. This Trojan may be unknowingly downloaded by a user while
However, as of this writing, the said sites are inaccessible. Installation This Trojan drops the following copies of itself into the affected system: %System%\avgsvc.exe (Note: %System% is the
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It requires its main component to successfully perform its intended routine. Arrival