Keyword: troj_crypctb
44666 Total Search   |   Showing Results : 961 - 980
NOTES: This is a Trend Micro detection for files with incomplete infection of PE_ZMIST.Ax. Because of the complexity of PE_ZMIST.Ax infection process, some hosts files are left with garbage
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. It deletes itself after execution. Dropping Routine This Trojan
This Trojan may be downloaded from remote sites by other malware. It displays fake alerts that warn users of infection. It also displays fake scanning results of the affected system. It then asks for
This Trojan deletes itself after execution. Installation This Trojan drops the following files: %System Root%\Documents and Settings%\All Users\Application Data\iChGbNa24901\iChGbNa24901.exe -
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This Trojan has coding errors that prevent it from running its malicious routines. NOTES: Based on analysis of the codes, it has the following capabilities: This is the detection of Trend Micro for
This Trojan executes the files it drops, prompting the affected system to exhibit the malicious routines they contain. Dropping Routine This Trojan drops the following files: %User Profile%
Installation This Trojan drops the following files: %User Profile%\Application Data\Adobe\AdobeUpdate .exe - non malicious %current folder%\err.log{random numbers} - detected by Trend Micro as
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_PIDIEF.OB Installation This Trojan drops and executes the following files: %Temp
This Trojan deletes itself after execution. Installation This Trojan drops the following files: {malware path}\{malware file name} %System Root%\Documents and Settings\All Users\Application Data
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It executes the files it drops, prompting the affected
As of this writing, the said sites are inaccessible. Installation This Trojan drops the following files: %User Profile%\pizda_ntload.dll - detected as TROJ_DROPPER.PXH (Note: %User Profile% is the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies Internet Explorer security settings. This
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. As of this
Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it exploits an unknown vulnerability in Adobe
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
Other Details This Trojan does the following: This Trojan is a malicious DMG file that contains prepended codes in its malware body, thus, the file is unable to execute properly. Once prepended codes
It enables the OS continue booting without crashing by replicating a particular system library. It is a component file of BKDR_TDSS. It is also responsible for loading the other component file,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely