Search
Keyword: troj _ vundo
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be unknowingly
This Trojan executes when a user accesses certain websites where it is hosted. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan is a Java component of the Blackhole Exploit Kit. It aids in deobfuscating some parameters on the exploit kit's HTTP session, thus, helping the kit execute its intended payload. This
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a
This Trojan arrives as a Java Applet component of a malicious Java archive file (.JAR) that is hosted in a malicious website. It downloads files. It executes the downloaded files. As a result,
NOTES: This malware may arrive as a legitimate Microsoft DLL file that has been altered by another malware as an autostart mechanism. Upon execution, it attempts to execute the following Microsoft
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a hidden Internet Explorer window. Arrival
This Trojan exploits a vulnerability in Adobe Flash in order to download and execute a possibly malicious file. As a result, malicious routines of the downloaded file are also exhibited on the
This Trojan displays a page that prompts users to click two hyperlinks in its body. This Trojan arrives as attachment to mass-mailed email messages. This is the Trend Micro detection for files that
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan creates a window with the title "Windows Internet Explorer" and may display content from certain non-malicious sites. If the user attempts to close the window it will continue to create
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This is Trend Micro's detection for an infected Master Boot Record (MBR) modified by another malware. NOTES: This is Trend Micro's detection for a system's infected Master Boot Record (MBR) that has