Keyword: troj_wmighost.a
100698 Total Search   |   Showing Results : 1821 - 1840
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This Trojan may be unknowingly downloaded by a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays fake alerts that warn users of infection. It
This Trojan serves as a loader for other possible malicious files. It checks for components. It then creates processes where it will inject its components. It also attempts to execute a file. As a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses icons similar to those of legitimate
This Trojan may arrive bundled with malware packages as a malware component. It may arrive as a file that exports functions used by other malware. It arrives on a system as a file dropped by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This backdoor may be dropped by other malware. It opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the remote user executes
unknowingly downloaded by a user while visiting malicious websites. It injects its dropped file/component to specific processes. It opens a hidden Internet Explorer window. It executes the dropped file(s). As a
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan sends lists of running processes before and after downloading additional files are to a certain URL. This routine is done to check if it successfully executed the files it downloaded. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities in
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This specially-crafted .DOC file takes advantage of a vulnerability in certain versions of Microsoft Office to execute a malicious component detected as BKDR_POISON.BJP. As a result, routines of the
This Trojan targets routers and attempts to log in to all the devices connected to the routers. It pretends to be an Adobe Flash update. To get a one-glance comprehensive view of the behavior of this
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user