Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 4261 - 4280
This Trojan modifies a certain file where it inserts a line line under the [ExtensionDirs] section. This Trojan may be dropped by other malware. As of this writing, the said sites are inaccessible.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives as a file that exports the functions of other malware/grayware. It may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. As of this writing,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan is a command line application which is capable of obtaining email accounts from the infected system. It saves the information to a text file it created. This Trojan may be unknowingly
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: WORM_HAMWEQ.GAZ NOTES: This is the Trend Micro detection for AUTORUN.INF files
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It automatically
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as attachment to mass-mailed email messages. However, as of this writing, the said sites are inaccessible. It deletes the initially executed copy of itself. Arrival Details This
This specially crafted PDF takes advantage of a vulnerability in U3D implementation in certain versions of Adobe Reader and Acrobat . After successfully exploiting the said vulnerability, it drops an
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It
Upon execution, it opens the non-malicious dropped .PDF document, Israel could still strike Iran.pdf , in order to hide its malicious routines from the user. This Trojan arrives as an attachment to
This Trojan takes advantage of a vulnerability in Adobe Reader and Adobe Acrobat to download possibly malicious file(s) from a certain URL. This Trojan arrives as an attachment to email messages
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a