Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 4361 - 4380
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: This is the Trend Micro threat detection for AUTORUN.INF files that serve as autostart
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of software vulnerabilities in certain software to drop malicious
However, as of this writing, the said sites are inaccessible. It is a component of other malware. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation.
This Trojan may arrive as a file that exports functions used by other malware. It is injected into all running processes to remain memory resident. It opens a hidden Internet Explorer window. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes downloaded files whose malicious routines
This Trojan accesses websites to download files. This Trojan arrives as attachment to mass-mailed email messages. As of this writing, the said sites are inaccessible. Arrival Details This Trojan
This Trojan arrives as attachment to mass-mailed email messages. It deletes itself after execution. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Other Details This
This is the Trend Micro detection for JOB files dropped by WORM_DOWNAD variants. NOTES: Other Details Based on analysis of the codes, it has the following capabilities: This is the Trend Micro
When executed, this Trojan modifies the infected system's registry in order to automatically execute its dropped components at every system startup. It also creates certain entries under random keys
Other Details Based on analysis of the codes, it has the following capabilities: This Java Applet is a component of a malicious Java archive file (.JAR) that is hosted in a malicious Web site. It
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a result, malicious routines of the
Installation This Trojan drops the following copies of itself into the affected system: %System%\userini.exe (Note: %System% is the Windows system folder, which is usually C:\Windows\System on
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. Installation This Trojan drops and executes the following files: %User Temp%\explorer.exe -
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It executes
This Trojan deletes itself after execution. Dropping Routine This Trojan drops the following files: %System%\gulongServer.dll - detected as TROJ_DLOADR.PNC (Note: %System% is the Windows system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: BKDR_QBOT/BKDR_QAKBOT family Other Details This Trojan does the following: This is
This Trojan ransomware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it