Keyword: troj_cryptesla
44814 Total Search   |   Showing Results : 3361 - 3380
This FAKEAV malware disguises itself as an antivirus specifically made for the Windows 8 operating system. This particular FAKEAV variant was seen in October 2012, which is the same month Windows 8
This is the Trend Micro detection for files that exhibit certain behaviors. Other Details This is the Trend Micro detection for: Files encrypted by a known malicious crypter.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It does
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Trojan may arrive bundled with malware packages as a malware component. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may arrive
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It displays fake alerts. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting
This malware uses social engineering to lure users into performing actions that may end up compromising themselves. Specifically, it purports to be involved with the Federal Bureau of Investigation
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan may be dropped by other malware. It exports functions used by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan is a ransomware using fake digital certificates to avoid digital signing checks. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are