Keyword: TROJ_AGENT
49030 Total Search   |   Showing Results : 3481 - 3500
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the dropped file(s). As a result, malicious routines of the
As of this writing, the said sites are inaccessible. It deletes the initially executed copy of itself. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting the following
This Trojan takes advantage of a vulnerability in Java Runtime Environment (JRE) to download and execute other possibly malicious file(s). It may require other components to successfully exhibit the
This Trojan takes advantage of a vulnerability in Java Runtime Environment (JRE) to download and execute other possibly malicious file(s). It may require other components in order to successfully
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes registry entries, causing some applications
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays fake alerts that warn users of infection. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan takes advantage of a vulnerability in Java Runtime Environment (JRE) to download and execute other possibly malicious file(s). It may require other components to successfully exhibit the
Upon execution, it opens the non-malicious dropped .PDF document, Israel could still strike Iran.pdf , in order to hide its malicious routines from the user. This Trojan arrives as an attachment to
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It executes the dropped file(s). As a result, malicious routines of the
This Trojan adds certain registry entries to disable the Task Manager. This action prevents users from terminating the malware process, which can usually be done via the Task Manager. Installation
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of software vulnerabilities in certain software to drop malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
It adds strings to the Windows HOSTS file. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Installation This Trojan drops the following copies of itself