Search
Keyword: trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It does not have any propagati...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It does not have any informa...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.It does not have any propagation routine.It does not have any backd...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It does not have any informa...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website.It does not have any propagation routine.It does not have any backdoor routine.It does not have ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This Trojan may be hosted on a website and run when a user accesses the said website.It does not have any propagation routine.It does not have any backdoor routine.It does not drop any other file.It does not have any downloading capability.It does n...
This Trojan appeared on the Google Play app market. Once this Trojan is installed on the affected device and the application is used, it creates a shortcut that looks like it is the game, Legend of Zelda. It also adds shortcuts to websites on the aff...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It executes the dropped file...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It bears the file icons of ...
This Trojan may be hosted on a website and run when a user accesses the said website.It does not have any propagation routine.It does not have any backdoor routine.It does not drop any other file.It does not have any downloading capability.It does n...
It does not have rootkit capabilities.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the Internet Explorer Zone Settings.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It does not have any informa...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It connects to certain w...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the Internet Explorer Zone Settings.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It does not have any downloading capability.It does not have a...