Keyword: troj_crypctb
44666 Total Search   |   Showing Results : 1061 - 1080
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It modifies the affected system's HOSTS files. This prevents users from accessing certain websites. It deletes
This Trojan bears the file icons of certain applications to avoid easy detection and consequent removal. It deletes itself after execution. Installation This Trojan bears the file icons of the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
Installation This Trojan drops the following files: %system root%\Documents and Settings\All Users\Application Data\winsvcfs.DLL - detected as TROJ_INJECT.UUU %User Temp%\{malware name}.doc -
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_PIDIEF.OB Installation This Trojan drops and executes the following files: %Temp
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It accesses websites to download files. This action allows this malware to possibly add
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It deletes itself after execution.
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_DROPPER.KFT Installation This Trojan injects itself into the following processes
Installation This Trojan drops the following files: %User Profile%\Application Data\Adobe\AdobeUpdate .exe - non malicious %current folder%\err.log{random numbers} - detected by Trend Micro as
Other System Modifications This Trojan adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\Winlogon EnableConcurrentSessions = 1 HKEY_LOCAL_MACHINE
As of this writing, the said sites are inaccessible. Installation This Trojan drops the following files: %User Profile%\pizda_ntload.dll - detected as TROJ_DROPPER.PXH (Note: %User Profile% is the
This Trojan takes advantage of a known vulnerability in Adobe Reader and Acrobat version 9.x before 9.4 and 8.x before 8.2.5. It executes the files it drops, prompting the affected system to exhibit
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. As of this
Installation This Trojan drops the following files: %temp%\set.jtd - normal ichitaro file %temp%\ews.exe - detected by Trend Micro as TROJ_DROPPER.BIY Other Details This Trojan does the following:
Trend Micro has received multiple samples of this malware from a malicious domain source that have infected many clients. These indicate that this malware poses a high risk to users due to the
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the dropped file(s). As a result, malicious routines of the
This worm accesses websites to download files detected by Trend Micro as: TROJ_FAKEAV.SM8 TROJ_RIMECUD.DL WORM_RIMECUD.SMC This worm arrives via removable drives. It drops an AUTORUN.INF file to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a