Keyword: TROJ_DELF
45195 Total Search   |   Showing Results : 3761 - 3780
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be manually installed by a user. Arrival Details This Trojan arrives as an
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This is the Trend Micro detection for files that exhibit certain behaviors. Other Details This is the Trend Micro detection for: malware that are capable of dropping and executing other possibly
Installation This Trojan drops the following files: %Application Data%\Microsoft\IME\V2005\PHIME2002A.exe (Note: %Application Data% is the current user's Application Data folder, which is usually C:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This is the Trend Micro detection for files that exhibit certain behaviors. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: Other
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: WORM_HAMWEQ.GAZ NOTES: This is the Trend Micro detection for AUTORUN.INF files
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: This is the Trend Micro detection for AUTORUN.INF files that serve as autostart
This Trojan connects to a server to wait for commands coming from a remote user. If the connection is successful, it may download/upload files or perform shell commands. This Trojan may arrive
This Trojan arrives as attachment to mass-mailed email messages. However, as of this writing, the said sites are inaccessible. It deletes the initially executed copy of itself. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This specially crafted PDF takes advantage of a vulnerability in U3D implementation in certain versions of Adobe Reader and Acrobat . After successfully exploiting the said vulnerability, it drops an
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded