Keyword: troj_cryptesla
44814 Total Search   |   Showing Results : 4061 - 4080
This Trojan adds certain registry entries to disable the Task Manager. This action prevents users from terminating the malware process, which can usually be done via the Task Manager. It displays
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It displays fake
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Installation This Trojan drops the following files: %My Documents%\NOTEPAD %Application Data%\SPIRITSOFT\URLSPIRIT\product.dat %Application Data%\SPIRITSOFT\URLSPIRIT\bd.dat %Application Data%
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It acts as a Browser Helper Object (BHO) that monitors a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
It attempts to connect to the a specific URL to download possible malicious file. As a result, routines of the downloaded file are exhibited in the system. This Trojan may be dropped by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan deletes itself after execution. Installation This Trojan drops the following copies of itself into the affected system: %User Temp%\csrssr.exe (Note: %User Temp% is the current user's
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan takes advantage of a vulnerability in Java Runtime Environment (JRE) to download and execute other possibly malicious file(s). It may require other components to successfully exhibit the
This Trojan takes advantage of a vulnerability in Java Runtime Environment (JRE) to download and execute other possibly malicious file(s). It may require other components in order to successfully
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It checks the operating system name of the
This spyware is the final payload of a massive Web page injection targeting osCommerce sites. It attempts to steal credit card information from the sites' potential customers. To get a one-glance
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It executes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a