Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 4321 - 4340
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
ZLOB malware has been around since 2006. It is known to arrive on computers posing as a video codec. As this malware family expanded, some incidents recorded by Trend Micro noted its arrival via
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
If a process named AVP.EXE exists, this malware drops a system driver component as %User Temp%\atapi.sys . The said system file is used by the malware to avoid detection and be able to load into
This backdoor has received attention from independent media sources and/or other security firms. Specifically, it is the dropped file of TROJ_MSPOSER.ASM, a Trojan that takes advantage of the Epsilon
This Trojan arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. Installation This Trojan adds the
This Trojan arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
Installation This Trojan stays memory-resident by injecting codes into the following processes: csrss.exe Other System Modifications This Trojan adds the following registry entries:
Dropping Routine This Trojan drops the following files: %Program Files%\{installation folder}\KDTAnywhereS.exe - detected as BKDR_VIYENSI.KDT (Note: %Program Files% is the default Program Files
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This Trojan deletes itself after execution. Installation This Trojan drops and executes the following files: %System%\Com\ie.exe (Note: %System% is the Windows system folder, which is usually C:
This Trojan connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It installs a fake antivirus/antispyware software. It displays fake alerts that warn users of infection. It also
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_PDFJS.MM Autostart Technique This Trojan adds the following registry entries to
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other