Search
Keyword: trojan spyware
This is a Windows Help (.HLP) file that is specially crafted to drop a malicious file. When executed, it shows a blank Windows Help window.This Trojan arrives as attachment to mass-mailed email messages.It does not have any propagation routine.It do...
This Trojan may be downloaded by other malware/grayware/spyware from remote sites.It adds registry entries to enable its automatic execution at every system startup.
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, Specifically, it is a component file of PE_DELPACK.A, a file infector that infects files by compressin...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It executes the dropped file(s). As a result, malicious routin...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It exec...
This malware is part of the Shadow Brokers' leaked tools and exploits. It targets Windows NT 4.0 OS and Microsoft Exchange Server. Despite targeting older environments, an external report on its traffic capture shows successful communications with th...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It logs a user's keystrokes to steal information.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does...
This Trojan arrives as a component bundled with malware/grayware packages.It modifies the Internet Explorer Zone Settings.It redirects browsers to certain sites.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this wr...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.
This Trojan may arrive bundled with malware packages as a malware component.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as of this writing, the said sites are inaccessible.