Keyword: troj_crypctb
44666 Total Search   |   Showing Results : 121 - 140
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: BKDR_WBECHECK TROJ_ADCLICK
This Trojan attempts to overwrite the Master Boot Record (MBR) with its codes. However, this may cause problems in the system such as boot failure. It attempts to perform certain queries on the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It poses as an antispyware application that uses pop-up
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It injects its dropped file/component to specific
The malicious files <i>flash32.exe</i> and <i>kbflashUpd.dll</i> are detected as TROJ_FLASHUP.A and TROJ_FLASHUP.B, respectively. These are the
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/31122009122650.jpeg How does this threat get into users' systems? Spammed messages lure users into downloading an electronic game related to the 2009
This Trojan downloads updated copies of itself from certain websites. It redirects searches to a specific IP address if the search engine URL contains certain strings. This Trojan may be dropped by
Upon execution, this worm drops files on the affected system. This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
This malware shares code similarities with the STUXNET malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This is the Trend Micro
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This is the detection for the payload related to the Hacking Team Flash zero-day affecting latest version of Flash in Windows, Mac, and Linux. Once this zero-day vulnerability has been successfully
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan connects to a malicious server to report infection and to download a file. It uses specific encrypted configuration files. It sends an HTTP request to its C&C, which contain encrypted
This malware is possibly connected with DUQU malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan arrives as a dropped
This Trojan arrives as a dropped file of another malware. It also arrives with certain files. This Trojan is registered as a service that enables it to automatically execute during startup. This
This malware is possibly connected with DUQU malware, which shares code similarities in STUXNET malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat