Keyword: troj_vundo
44683 Total Search   |   Showing Results : 641 - 660
following substrings: samp smpl vir malw test troj (Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, Windows
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. Installation This Trojan drops
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of
This malware poses as a Chrome browser plugin required to play videos. Users receive a message with a link in the social networking site, Facebook. Clicking the URL leads to a page that supposedly
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded from remote sites by other malware.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan executes then deletes itself afterward. Installation This Trojan drops the following file(s)/component(s): %System%\68c0bb68f02a.dll - also detected as TROJ_FAKEAV.DJK (Note: %System% is
It is a script that may be used to compromise a server running a vulnerable PHP application. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/0310201311155.gif Security researchers have noted a sudden increase in Tor traffic during the latter part of August 2013. According to reports , the
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/2611201045724.jpeg How do users get this Web threat? The threat arrives via a spoofed email message from Microsoft with the subject "Microsoft
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/121201155725.jpegSpammers started the year right with an email message that supposedly led to New Year’s e-cards. Various versions of the spammed
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/163201053839.jpeg Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal";