Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 4321 - 4340
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It executes the dropped file(s). As a result, malicious routines of the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It also has rootkit capabilities, which enables it to
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. This is the Trend Micro detection for
It is a fake system diagnostic tool that tricks users into thinking that it is a legitimate program capable of searching for errors and issues on the affected system. Upon execution, it displays a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses a convincing Graphical User Interface to make
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses a convincing Graphical User Interface to make
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This Trojan uses common file icons to trick a user into thinking that the files are legitimate. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It
This Trojan may be downloaded from remote sites by other malware. It connects to certain websites to send and receive information. Arrival Details This Trojan may be downloaded from remote site(s) by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan deletes itself after execution. Installation This Trojan drops the following files: %User Temp%\{random file name}.jpg (Note: %User Temp% is the current user's Temp folder, which is
This Trojan takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to download files on the affected machine. It takes advantage of certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. Arrival
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan may be dropped by other malware. It arrives as a component
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It connects to certain URLs. It may do this to remotely inform a malicious
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This Trojan may arrive bundled with malware packages as a malware component. It may be downloaded by other malware/grayware/spyware from remote sites. It deletes itself after execution. Arrival