Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 4601 - 4620
Installation This Trojan drops and executes the following files: %System%\kbupdate.dll - detected as TROJ_VUNDO.MBA (Note: %System% is the Windows system folder, which is usually C:\Windows\System on
This Trojan deletes itself after execution. Installation This Trojan drops the following files: %System%\ismserv.dll - non-malicious file (Note: %System% is the Windows system folder, which is
This is the Trend Micro detection for files that exhibit certain behaviors. Other Details This Trojan does the following: Drops and runs a copy of WORM_PROLACO.EK, as well as the .EXE or .MSI
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CLASSES_ROOT\CLSID\{AFD4AD01-58C1-47DB-A404-FBE00A6C5486}
As of this writing, the said sites are inaccessible. It connects to certain websites to send and receive information. Download Routine As of this writing, the said sites are inaccessible. Other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
Installation This Trojan adds the following possibly malicious files or file components: %System%\791885.dll %System%\847286.dll (Note: %System% is the Windows system folder, which is usually C:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies certain registry entries to disable Security
This Trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it takes advantage
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by the following malware:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It displays fake
As of this writing, the said sites are inaccessible. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a
This Trojan executes downloaded files whose malicious routines are exhibited by the affected system. Installation This Trojan drops the following copies of itself into the affected system: {malware
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: BKDR_GIBON.SMA Other System Modifications This Trojan adds the following registry
When executed, this Trojan accesses an adult site. This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It executes when a user accesses certain websites where it is
This is a Trend Micro detection for specially crafted .JPG, .PNG, .SWF, .PDF, .BMP and .GIF picture files that contains an iframe pointing to the possibly malicious websites. This Trojan arrives as