Keyword: troj_dropper.gay
46116 Total Search   |   Showing Results : 81 - 100
This Trojan executes the files it drops, prompting the affected system to exhibit the malicious routines they contain. Arrival Details This Trojan may be downloaded from the following remote sites:
This Trojan may be dropped by other malware. It adds services similar to legitimate applications' to trick a user into thinking they are legitimate. It deletes itself after execution. Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It executes the
This malware arrives via spammed email message written in Japanese language that bore the subject, New Year Greetings. This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is the Trend Micro detection for files that exhibit certain behaviors. Installation This Trojan drops the following files: %System%\Iasex.dll - detected as BKDR_SMALL.LEC %System%
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
analysis system. TrojanDropper:Win32/Agent.FTE (Microsoft); Generic Dropper (McAfee); Infostealer.Gampass (Symantec); Trojan-Dropper.Win32.KGen.gen (Kaspersky); Trojan.Dropper.Crypt.E (FSecure)
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
an automated analysis system. TrojanDropper:Win32/Dunik!rts (Microsoft); Generic Dropper (McAfee); Trojan Horse (Symantec); Trojan-Dropper.Win32.Agent.vjv (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt