Keyword: troj_crypctb
44668 Total Search   |   Showing Results : 3261 - 3280
This Trojan modifies the Internet Explorer Zone Settings. It displays fake alerts that warn users of infection. It also displays fake scanning results of the affected system. It then asks for users
This Trojan displays fake alerts upon installation. It displays fake scanning results about disk errors. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be downloaded by other malware/grayware from remote sites. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected
This Trojan takes advantage of the following software vulnerability to drop malicious files: Adobe and Acrobat .PDF Vulnerability This Trojan arrives as an attachment to email messages spammed by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan may be dropped by other malware. It exports functions used by other malware. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan exports functions used
This Trojan exports functions which are used by its mother component. This Trojan may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: malware that belong to the QAKBOT family NOTES: This malware is used as a storage
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses a file name similar to a legitimate file to pass
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan modifies Internet Explorer security settings. This puts the affected computer at greater risk, as it allows malicious URLs to be accessed by the computer. It attempts to access certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a