Keyword: TROJ_AGENT
49012 Total Search   |   Showing Results : 901 - 920
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This malware is related to the fake flash player scam targeting users in Turkey. It starts with a video link sent via Facebook. This malware specifically pretends as the update and installs the bogus
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This malware is associated with attacks involving malicious attachments for Hangul Word Processor (HWP). In the attack, PostScript is used to gain access to a victim's machine. This Trojan arrives on
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
detection: avcuf32.dll BgAgent.dll guard32.dll wl_hook.dll QOEHook.dll a2hooks32.dll Checks the following sandbox related filepaths and terminates if found: C:\agent\agent.pyw C:\sandbox\starter.exe c:\ipf
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It displays fake
\AVG10\avgtray.exe %Program Files%\AVG\AVG10\avgrsx.exe %Program Files%\AVG\AVG10\avgcsrvx.exe %Program Files%\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSAgent.exe %Program Files%\AVG\AVG10\Identity
This Trojan arrives as a file that exports the functions of other malware/grayware. It may be dropped by other malware. It requires its main component to successfully perform its intended routine.
This is the Trend Micro detection for a 64-bit component of SIREFEF/ZEROACCESS family. This Trojan may arrive bundled with malware packages as a malware component. It may arrive as a file that
If a process named AVP.EXE exists, this malware drops a system driver component as %User Temp%\atapi.sys . The said system file is used by the malware to avoid detection and be able to load into