Keyword: TROJ_DLOADER
44904 Total Search   |   Showing Results : 1861 - 1880
This Trojan deletes itself after execution. Installation This Trojan drops the following copies of itself into the affected system: %User Startup%\siszpe32.exe (Note: %User Startup% is the current
Other Details This Trojan does the following: This Trojan is a malicious file that contains prepended codes in its malware body, thus, the file is unable to execute properly. When prepended codes
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Download Routine This Trojan accesses the following websites
This Trojan drops malicious files onto the affected system. It modifies the registry to ensure its execution every system activation. It steals information related to the game Arad Senki , and sends
This Trojan deletes itself after execution. Installation This Trojan drops the following files: %System Root%\Documents and Settings%\All Users\Application Data\iChGbNa24901\iChGbNa24901.exe -
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives as attachment to mass-mailed email messages. It may be dropped by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This is the Trend Micro detection for files that exhibit certain behaviors. Installation This Trojan drops the following files: %System%\Iasex.dll - detected as BKDR_SMALL.LEC %System%
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a result, malicious routines of the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival Details This
This Trojan uses common file icons to trick a user into thinking that the files are legitimate. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on
This Trojan deletes itself after execution. Installation This Trojan drops the following files: {malware path}\{malware file name} %System Root%\Documents and Settings\All Users\Application Data
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It bears the file icons of certain applications to avoid
This Trojan has increased potential for damage, propagation, or both, that it possesses. Specifically, it is related to an attack that involves blackhat SEO poisoning of Google Image search results.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies Internet Explorer security settings. This
This Trojan may be downloaded from remote sites by other malware. It displays fake alerts. It displays fake alerts that warn users of infection. It also displays fake scanning results of the affected
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a result, malicious routines of the
The LizaMoon SQL injection attack inserted malicious .PHP scripts into several legitimate websites. As of this writing, the said attack leads to the download of one of two malware. TROJ_FAKEAV.BBK, a