Search
Keyword: troj strtpage.be
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This Trojan may be unknowingly downloaded by a user
folders using a certain file name. Trend Micro detects the dropped AUTORUN.INF file as TROJ_OTORUN.SMF. This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This Trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It uses the default Windows folder icon to trick users into opening the
This Trojan may arrive bundled with malware packages as a malware component. It may be unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run when a
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a result, malicious routines of the
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It adds certain registry entries to disable the Task Manager. This
also sends its stolen information. It terminates certain processes if found running in the affected system's memory. This spyware may be dropped by other malware. It may be unknowingly downloaded by a
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It is a specially crafted PDF file
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It adds certain registry entries to disable the Task Manager. This
This Trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it takes advantage
The Wirelurker malware was seen affecting both OS X and iOS devices. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan may be
This Trojan may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected
services. This action prevents most of the system functions to be used. It connects to certain websites to send and receive information. Arrival Details This Trojan arrives on a system as a file dropped by
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It connects to
attachment to email messages spammed by other malware/grayware or malicious users. It may arrive bundled with malware packages as a malware component. It may be unknowingly downloaded by a user while visiting
system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware/spyware from remote sites. It may be
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be dropped by other malware. Arrival Details This Trojan may be unknowingly downloaded by a user while