Search
Keyword: troj_cryptesla
Installation This Trojan drops the following files: %User Temp%\Temp\notpad.exe - also detected as TROJ_HIDFILE.INF %User Temp%\Temp\RGZ DECODER.EXE - non-malicious file (Note: %User Temp% is the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan takes advantage of software vulnerabilities in certain software to drop malicious files. Installation This Trojan drops the following non-malicious files: %User Temp%\{malware file name
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. Installation This Trojan drops the following non-malicious file: c:\{ascii characters
This is the Trend Micro detection for files that exhibit certain behaviors. Installation This Trojan drops the following files: %System%\Iasex.dll - detected as BKDR_SMALL.LEC %System%
Installation This Trojan drops the following files: %system root%\Documents and Settings\All Users\Application Data\winsvcfs.DLL - detected as TROJ_INJECT.UUU %User Temp%\{malware name}.doc -
This Trojan may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival Details This
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan poses as a legitimate antivirus software using various commercial names. Similar to other FAKEAV variants, TROJ_FAKEAV.KQWL also displays several graphical users interfaces (GUIs) to
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
It may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious