Keyword: TROJ_AGENT
49010 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Other Details Based on analysis of the codes, it has the following capabilities: This is the detection of Trend Micro for damaged samples of TROJ_AGENT variants.The said samples have coding errors
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_AGENT TROJ_SMALL TROJ_DROPPER If
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_AGENT WORM_RBOT TROJ_MANCYSN If
Trend Micro detection for: Damaged variants of the TROJ_AGENT family Samples detected by this pattern contains code errors, thus they fail to exhibit their intended routines Mal/MSIL-DM (SOPHOS_LITE),
websites. NOTES: This is Trend Micro's Automated Smart Pattern Proactive Detection for files that manifest similar behavior and characteristics as the following malware: TROJ_AGENT Upon execution, this Trojan
HTML_PSYME HTML_SOHANAD JS_ADODB JS_AGENT JS_DLOADER JS_EXPLOIT JS_INJECT JS_JSSHELL JS_PADODOR JS_PETCH JS_PSYME TROJ_DELF JS_SMALL TROJ_AGENT TROJ_DLOADER TROJ_PSYME VBS_AGENT VBS_DELF VBS_DLOADER VBS_SMALL
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_PIDIEF.EVF Installation This Trojan drops the following copies of itself into
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as a component bundled with malware/grayware packages. It may be manually installed by a user. Arrival Details This Trojan arrives as a component bundled with malware/grayware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not drop any other file. It requires its main