Keyword: TROJ_AGENT
49004 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Other Details Based on analysis of the codes, it has the following capabilities: This is the detection of Trend Micro for damaged samples of TROJ_AGENT variants.The said samples have coding errors
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_AGENT TROJ_SMALL TROJ_DROPPER If
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_AGENT WORM_RBOT TROJ_MANCYSN If
Trend Micro detection for: Damaged variants of the TROJ_AGENT family Samples detected by this pattern contains code errors, thus they fail to exhibit their intended routines Mal/MSIL-DM (SOPHOS_LITE),
websites. NOTES: This is Trend Micro's Automated Smart Pattern Proactive Detection for files that manifest similar behavior and characteristics as the following malware: TROJ_AGENT Upon execution, this Trojan
HTML_PSYME HTML_SOHANAD JS_ADODB JS_AGENT JS_DLOADER JS_EXPLOIT JS_INJECT JS_JSSHELL JS_PADODOR JS_PETCH JS_PSYME TROJ_DELF JS_SMALL TROJ_AGENT TROJ_DLOADER TROJ_PSYME VBS_AGENT VBS_DELF VBS_DLOADER VBS_SMALL
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as a component bundled with malware/grayware packages. It may be manually installed by a user. Arrival Details This Trojan arrives as a component bundled with malware/grayware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not drop any other file. It requires its main
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_PIDIEF.EVF Installation This Trojan drops the following copies of itself into