Keyword: trojan
300 Total Search   |   Showing Results : 261 - 280
This Trojan Spy may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It creates registry entries to enab...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Some variants of this Trojan attempt to load another file in memory. It needs its other components to function properly.This Trojan arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visit...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the Internet Explorer Zone Settings.It connects to certain websites to send and receive informa...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the Internet Explorer Zone Settings.It connects to certain websites to send and receive informa...
This Trojan opens its dropped file %User Temp%\document.doc in order to hide its malicious routines from the user.This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propag...
This Trojan connects to a non-malicious URL. It does this periodically every ten minutes. It may do this to possibly collect per-click advertising payments.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded un...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.It does not have any propagation routine.It does not have any backdoor routine.It executes the dropped file(s). As a result, malicious routin...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the Internet Explorer Zone Settings.It connects to certain websites to send and receive informa...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.It does not have any propagation routine.It does not have any backdoor ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution. It is capable of encrypting files in the affected system.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It does not have any informa...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan may be dropped by other malware.It connects to certain websites to send and receive information.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan may be unknowingly downloaded by a user while visiting malicious websites.It displays fake alerts.