Keyword: troj_crypctb
44667 Total Search   |   Showing Results : 2041 - 2060
This Trojan is used by BKDR_SIMDA.RU for elevating privlieges in a 64-bit environment. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following
This Trojan may be dropped by other malware. It exports functions used by other malware. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan exports functions used
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives as attachment to mass-mailed email messages. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival
Upon execution, This Trojan opens a non-malicious dropped document file in order to hide its malicious routines from the user. This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the files it drops, prompting the affected system to exhibit the malicious
This Trojan is a self-extracting archive (RAR SFX) that is configured to install components to a system. This Trojan arrives as attachment to mass-mailed email messages. It executes the dropped file
This is the Trend Micro detection for 64-bit DLL components of the ZeroAccess malware family. Autostart Technique This Trojan modifies the following registry entry(ies) to enable its automatic
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It exports functions used by other malware. It requires
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It exports functions used by other malware. It requires
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives as a component bundled with malware/grayware packages. It is a component of other malware. It requires its main component to successfully perform its intended routine. Arrival
It attempts to connect to possibly malicious sites. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan may be dropped by other malware. It exports functions used by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may
This Trojan arrives as attachment to mass-mailed email messages. It connects to certain websites to send and receive information. However, as of this writing, the said sites are inaccessible. Arrival