Keyword: TROJ_AGENT
49032 Total Search   |   Showing Results : 121 - 140
This Trojan arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This Trojan deletes itself after execution. Installation This Trojan drops and executes the following files: %System%\Com\ie.exe (Note: %System% is the Windows system folder, which is usually C:
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
Installation This Trojan stays memory-resident by injecting codes into the following processes: csrss.exe Other System Modifications This Trojan adds the following registry entries:
Installation This Trojan drops the following copies of itself into the affected system: %System%\3361\svchost.exe (Note: %System% is the Windows system folder, which is usually C:\Windows\System on
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It installs a fake antivirus/antispyware software. It displays fake alerts that warn users of infection. It also
It adds registry entries as part of its installation routine. It drops the files. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. Other
This malware arrives as a file with ".p7c" extension (Digital ID File) and is bundled with a malware detected by Trend Micro as TROJ_LOADR.AUJQ as its autostart component. This Trojan arrives as
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan deletes itself after execution. Installation This Trojan drops the following copies of itself into the affected system: %User Temp%\AcroRD32.exe (Note: %User Temp% is the current user's
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This cracking application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform