Keyword: troj_crypctb
44667 Total Search   |   Showing Results : 2181 - 2200
This Trojan may be downloaded by other malware/grayware from remote sites. It takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to download
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the affected system's HOSTS files. This
This Trojan may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It uses common file icons to trick a user into thinking that the files are legitimate.
This Trojan may arrive bundled with malware packages as a malware component. As of this writing, the said sites are inaccessible. Arrival Details This Trojan may arrive bundled with malware packages
This malware is part of a malware spam campaign. It stops most of its malicious routines if certain processes are found running on the system. To get a one-glance comprehensive view of the behavior
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan displays fake alerts upon installation. It displays fake scanning results about disk errors. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be dropped by other malware. Arrival Details This Trojan may be unknowingly downloaded by a user while
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates registry entries to enable its automatic
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This malware has been reported by several media outfits. It gets user information from cookies stored in certain web browsers. To get a one-glance comprehensive view of the behavior of this Trojan,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan infects the Master Boot Record (MBR) of an affected system. It restarts the system afterwards and shows a ransom message, urging users to pay an amount in order to reverse the effect. To
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. Arrival Details This Trojan may be downloaded by other malware/grayware/spyware
Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, this malware is one of the "Printer