Skip to content

210 results in Threat Encyclopedia: “VIRTUMON”
Showing Results : 1 - 10
      NextNext Page
...is usually dropped and installed in the Windows system folder by other malware, such as other TROJ_VUNDO or TROJ_VIRTUMON variants. It registers itself as a Browser Helper Object (BHO). The said action enables this Trojan to monitor user...
Description:This grayware has been renamed to SPYW_VIRTUMON.GS.
Alias:Packed.Win32.Monder.gen (Kaspersky), Vundo (McAfee), Trojan.Vundo (Symantec), TR/Drop.Agent.CWD (Avira), Troj/Virtum-Gen (Sophos), Trojan:Win32/Vundo.gen!A (Microsoft)Description:This Trojan may be dropped by other malware.
Description:A spyware is a program that monitors and gathers user information for different purposes. Spyware programs usually run in the background, with their activities transparent to most users.
Description:A spyware is a program that monitors and gathers user information for different purposes. Spyware programs usually run in the background, with their activities transparent to most users.
Alias:Vundo,Trojan.Vundo,ADSPY/Virtumonde.HB.1,Trojan:Win32/Vundo.KDescription:This Trojan may be downloaded unknowingly by a user when visiting malicious Web sites. It may also arrive as a component dropped by TROJ_CONHOOK.CM. It is a .DLL file that exports functions used by other malware.
Description:This spyware arrives on a system as a file installed by malware or downloaded by an unsuspecting user when visiting certain Web sites. It is usually dropped in the system with a random file name.
Alias:TR/Vundo.Gen (Avira), Mal/Generic-A (Sophos), Trojan:Win32/Busky.B (Microsoft)Description:A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from the Internet and installed by unsuspecting users.
Description:This malware has been renamed to TROJ_VUNDO.AWY.
Description:A spyware is a program that monitors and gathers user information for different purposes. Spyware programs usually run in the background, with their activities transparent to most users.

Connect with us on