Keyword: agent
10709 Total Search   |   Showing Results : 1001 - 1020
This Trojan arrives as a Java Applet component of a malicious Java archive file (.JAR) that is hosted on a malicious website. NOTES: This Trojan arrives as a Java Applet component of a malicious Java
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself in all removable drives. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were
This spyware arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by
When executed, this Trojand rops files. These files are copies of itself and some non-malicious files. It also creates folders on the infected system. Installation This Trojan drops the following
It is capable of propagating via P2P shares. This worm connects to a website to send and receive information. Installation This worm drops the following copies of itself into the affected system:
Installation This worm drops the following copies of itself into the affected system: %User Profile%\My Documents\df5srvc.bfe %System Root%\{all folders found}\desktop.ini %System Root%\desktop.ini
This worm may be dropped by other malware. Arrival Details This worm may be dropped by other malware. Installation This worm drops the following files: %Current%\ipz-db.bin %Current%\log.txt
This worm may be unknowingly downloaded by a user while visiting malicious websites. It propagates via shared networks and drops copies of itself into available networks. Arrival Details This worm
This Trojan may arrive bundled with malware packages as a malware component. Arrival Details This Trojan may arrive bundled with malware packages as a malware component. NOTES: This Trojan executes
Trend Micro has flagged this JavaScript as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the behavior of
This backdoor may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival
Installation This Trojan drops the following copies of itself into the affected system: %Windows%\jusched.exe (Note: %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.)
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. Installation This Trojan adds the
This trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
It drops and executes a file detected as BKDR_TDSS.JAS. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the