Keyword: X2KM_DLOADR
46533 Total Search   |   Showing Results : 1841 - 1860
This Trojan arrives as a Java Applet component of a malicious Java archive file (.JAR) that is hosted in a malicious website. It downloads files. It executes the downloaded files. As a result,
This Trojan deletes the initially executed copy of itself. Installation This Trojan drops the following copies of itself into the affected system: C:\Program Files\{6-randomchars}.exe Autostart
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: It
This Trojan arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan arrives as a
This Trojan arrives as a component bundled with malware/grayware packages. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan arrives as a
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It bears the file icons of certain applications to avoid easy detection and consequent removal. It connects to
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It executes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan arrives as a component bundled with malware/grayware packages. It executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan arrives as a component
This malware is a component of a malicious Java archive file (.JAR). It may connect to remote sites to download possibly malicious files. However, it requires other components in order to run
This worm arrives via removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. As of this writing, the said