Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 3521 - 3540
This Trojan may arrive bundled with malware packages as a malware component. It may be injected into processes running in memory. Arrival Details This Trojan may arrive bundled with malware packages
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan is the malware component of a spam campaign that leverages the death of North Korean leader Kim Jong-Il. To get a one-glance comprehensive view of the behavior of this Trojan, refer to
It drops and opens a non-malicious .PDF file to trick the user that the file is non- malicious. Upon execution, it checks the version of the Adobe Acrobat on the system. If the version is 9.4 or
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan may be installed to the system by another file and acts as a malware component. Once running, it performs some of its payloads. The downloaded files are stored in a certain folder.It also
This is the Trend Micro detection for 64-bit DLL components of the ZeroAccess malware family. Autostart Technique This Trojan modifies the following registry entry(ies) to enable its automatic
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is used to load and execute a file. Arrival Details
This Trojan arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It may be
This Trojan is a command line application which creates another file in the current directory using the file name specified as parameter. This Trojan may be unknowingly downloaded by a user while
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This Trojan locks the desktop of the affected machine and demands the user to pay a fine in order to unlock the desktop. This Trojan may be unknowingly downloaded by a user while visiting malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a