Keyword: troj_wmighost.a
100698 Total Search   |   Showing Results : 1681 - 1700
This Trojan may arrive bundled with malware packages as a malware component. It may be unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run when a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal information, such as user names and
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It uses a file name similar to a legitimate file to pass as a legitimate
This malware exploits CVE-2012-0158 and uses a Tibetan-themed targeted campaign. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This
Both malware are related to the modified Enfal variants, which were reported to have infected 874 systems in 33 countries. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This malicious browser extension is disguised as a Facebook Valentines Theme that affects browsers, one of which is the Google Chrome browser. To get a one-glance comprehensive view of the behavior
This malware is the dropper for the malware BKDR_NELOWEG.DD, a backdoor whose primary purpose is stealing information from online transactions, which is capable of running on Windows Vista and
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This specially crafted PDF takes advantage of a vulnerability in U3D implementation in certain versions of Adobe Reader and Acrobat . After successfully exploiting the said vulnerability, it drops an
This Trojan takes advantage of a vulnerability in a certain software to drop malicious files. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It adds certain registry entries to disable the Task
This Trojan infects the Master Boot Record (MBR) of an affected system. It restarts the system afterwards and shows a ransom message, urging users to pay an amount in order to reverse the effect. To
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It uses a file name similar to a legitimate file to pass as a legitimate