Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 461 - 480
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. Autostart Technique This Trojan adds the following registry entries to enable its automatic
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. Installation This Trojan drops
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
following substrings: samp smpl vir malw test troj (Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, Windows
itself if the malware name and/or path has the following substrings: samp smpl vir malw test troj (Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
following substrings: samp smpl vir malw test troj Can do any of the following depending on the installation date of "%System%\win32k.sys": Create svchost process with this argument "-1 EVT{Volume ID}" Inject
if the malware name and/or path has the following substrings: samp smpl vir malw test troj Can do any of the following depending on the installation date of "%System%\win32k.sys": Create svchost
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
substrings: smpl vir malw test troj It terminates itself if any of the following user name(s) are found in the affected system: luser perl python trace dump It searches for itself in the following autostart
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives as attachment to mass-mailed email messages. It deletes itself after execution. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Dropping Routine
This Trojan drops a component that overwrites disk partitions. It renders the computer unusable after reboot. It is also used by TROJ_DISTTRACK.C when reporting to its C&C server. This Trojan may be
This Trojan overwrites disk partitions, rendering the affected computer unusable and unrecoverable. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
It is a script that may be used to compromise a server running a vulnerable PHP application. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by