Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 4381 - 4400
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the dropped file(s). As a result, malicious routines of the
This malware searches for specific file types in all drives. Once the files are found, it encrypts these files and then renames them. This Trojan executes certain actions WITHIN the affected
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of certain vulnerabilities. Arrival Details This Trojan arrives as an
Autostart Technique This Trojan modifies the following registry entries to ensure it automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion
Upon execution, it displays a GUI indicating the installation of a rogue antivirus called Internet Protection. While doing so, it downloads its component file from the a certain URL via HTTP GET. If
This Trojan deletes itself after execution. It displays fake alerts that warn users of infection. It also displays fake scanning results of the affected system. It then asks for users to purchase it
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It displays fake alerts that warn users of infection. It also displays fake
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It bears the file icons of certain applications to avoid easy detection and consequent
This Trojan connects to possibly malicious URLs. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan contains the following strings in its code: [AutoRun] open=BACKUP
This Trojan may be dropped by other malware. It is a component of other malware. It may be injected into processes running in memory. It requires its main component to successfully perform its
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the default Windows folder icon to trick users
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Installation This Trojan drops the following copies of itself
This Trojan employs registry shell spawning by adding certain registry entries. This allows this malware to execute even when other applications are opened. It bypasses the Windows firewall. This