Keyword: troj_crypctb
44667 Total Search   |   Showing Results : 2481 - 2500
Once a malware successfully exploits the vulnerability, it causes certain actions to be done on the system. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites. It may be
This Trojan opens its dropped file %User Temp%\document.doc in order to hide its malicious routines from the user. This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Microsoft Word document malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed.
This Trojan may be dropped by other malware. This is the Trend Micro detection for files that exhibit certain behaviors. Arrival Details This Trojan may be dropped by other malware. Other Details
This Trojan may be dropped by other malware. It is a component of other malware. It requires its main component to successfully perform its intended routine. It automatically executes files when a
This Trojan arrives via removable drives. It may be dropped by other malware. Arrival Details This Trojan arrives via removable drives. It may be dropped by other malware. Propagation The said .INF
Upon execution, this Trojan attempts to display a convincing GUI to allow the users to input sensitive banking information. However, the malware currently fails to connect to its server, thus
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It uses common
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan connects to an adult site. This Trojan arrives as attachment to mass-mailed email messages. It executes the downloaded files. As a result, malicious routines of the downloaded files are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible. It