Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 4441 - 4460
This Trojan requires its main component to successfully perform its intended routine. Rootkit Capabilities This Trojan is used by other malware for its rootkit functionalities. Other Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Installation This spyware drops the following files: %System%\lowsec\local.ds %System%\lowsec\user.ds.lll %System%\lowsec\user.ds (Note: %System% is the Windows system folder, which is usually C:
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This Trojan attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This Trojan may be unknowingly
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a result, malicious routines of the
Installation This Trojan drops the following copies of itself into the affected system: %Application Data%\Microsoft\svchost.exe (Note: %Application Data% is the current user's Application Data
This Trojan arrives as attachment to mass-mailed email messages. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Installation This Trojan drops the following files:
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be dropped by other malware. It may be
Installation This Trojan drops the following non-malicious files: %Application Data%\\brasil.dat %Application Data%\\lst1.dat %WINDOWS%\Installer\73192.msi (Note: %Application Data% is the current
However, due to errors in its code, it fails to perform its intended routine. However, due to errors in its code, it fails to perform its intended routine. Installation This Trojan drops the
HOSTS File Modification This Trojan overwrites the system's HOSTS files to prevent users from accessing the following websites: {BLOCKED}.253.22 008.wzhe123.cn {BLOCKED}.253.22 010389.com {BLOCKED
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It also has rootkit capabilities,
This Trojan bears the file icons of certain applications to avoid easy detection and consequent removal. It deletes itself after execution. Installation This Trojan bears the file icons of the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan opens a hidden Internet Explorer window. It connects to a website to send and receive information. It modifies the Internet Explorer Zone Settings. Installation This Trojan drops the
This Trojan attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This Trojan may be downloaded from the
Installation This spyware drops the following files: %System%\lowsec\local.ds %System%\lowsec\user.ds.lll %System%\lowsec\user.ds (Note: %System% is the Windows system folder, which is usually C:
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the