Search
Keyword: trojan spyware
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware/spyware from remote sites.
This Trojan Spy may be dropped by other malware.It executes commands from a remote malicious user, effectively compromising the affected system.It connects to certain websites to send and receive information.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware.
This Trojan has received attention from independent media sources and/or other security firms.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan may be downloaded by other malwa...
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It deletes itself after execution.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites.This is the Trend Micro detection for files that exhibit certain behaviors.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It is a component of other malware.It requires its main component to successfully perform...
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware.It connects to a website to send and receive information.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It deletes itself after execution.
This Trojan may allow unauthorized calls using RAS (Remote Access Service) on the affected machine. It may also set the affected machine to automatically dial certain numbers.This Trojan may be dropped by other malware.It modifies the Internet Explo...
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan attempts to access websites to download files, which are possibly malicious.This Trojan may be dropped by other malware.However, as of this writing, the said sites are inaccessible.
This Trojan may arrive bundled with malware packages as a malware component. It may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware.It is a component of other malware.It requires its main compone...
This Trojan may be dropped by other malware.It logs a user's keystrokes to steal information.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It connects to certain URLs....
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It does not have any propagation routine.It does not have any backdoor routine.It does no...
This Trojan may arrive bundled with malware packages as a malware component. It may be downloaded by other malware/grayware/spyware from remote sites.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.However, as of this writing, the said sites are inaccessible.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It executes when a user accesses certain websites where it is hosted.However, as of this writing, the said sites are inaccessible.