Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 3801 - 3820
This is the Trend Micro detection for AUTORUN.INF files dropped by its worm component in removable drives.It is used to enable automatic execution of dropped copies of the main component whenever the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Installation This Trojan drops the following files: %User Temp%\noh.exe %User Temp%\XC000FW.txt %system%\sysupbrnv7r1.dll (Note: %User Temp% is the current user's Temp folder, which is usually C:
Upon execution, this Trojan displays a convincing GUI to make the program look legitimate. This allows the user to input confidential bank account information. This Trojan may be unknowingly
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to get information from a list of banks or
This Trojan uses London Olympics 2012 as lure to users. The email message it sends tells users of a video about a scandal. Users are redirected instead to a fake YouTube page. To get a one-glance
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This Trojan is a malicious mIRC script that uses a legitimate mIRC client ( daemon.exe ) to connect to an IRC server and makes the affected computer a drone. Drones are hacked machines used to launch
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays fake alerts that warn users of infection. It
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This Trojan may be unknowingly downloaded by a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware