Search
Keyword: troj_crypctb
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. Arrival Details This Trojan may be downloaded by other malware/grayware/spyware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
This Trojan is a batch file compiled using a software called ExeScript in order to be converted and protected as an executable file (EXE). Upon execution, it drops, executes, and deletes the original
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. It injects its dropped file/component to specific processes. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan is responsible for sending information about the infection back to its server. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware/spyware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies Internet Explorer security settings. This
This Trojan moves .LNK files to the folder it creates and modifies the attributes of the files found in the affected system. This tricks the users into believing that the files have been deleted.
This Trojan displays a Graphical User Interface (GUI). When users agree to buy the software, it connects to a certain URL. It deletes the initially executed copy of itself. This Trojan may be dropped
This Trojan sets the attributes of all files in the affected system into Hidden to trick the users that the files have been deleted. It displays fake alerts upon installation. If the Buy license now
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It