Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 4641 - 4660
This Trojan may arrive as a file that exports functions used by other malware. Arrival Details This Trojan may arrive as a file that exports functions used by other malware. Installation This Trojan
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
This spyware also has rootkit capabilities, which enables it to hide its processes and files from the user. Installation This spyware drops the following files: %System Root%\explorrxxx.exe
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
It enumerates the entries in specific registry keys. It then overwrites the files referenced in these registries with copies of itself. The legitimate files are saved as {filename}{space}.exe .
This Trojan drops file(s)/component(s). It injects itself into certain processes as part of its memory residency routine. Installation This Trojan drops the following file(s)/component(s): %Windows%\
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, due to errors in its code, it fails to perform
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the said
This Trojan may be downloaded by other malware/grayware from remote sites. It uses icons similar to those of legitimate applications to entice a user to click them. Arrival Details This Trojan may be
This Trojan deletes itself after execution. Installation This Trojan drops the following non-malicious files: %Current%\{random numbers}_{Username}.nor %Current%\{random numbers}_{Username}.r
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be dropped by other malware. It may be
Other Details Based on analysis of the codes, it has the following capabilities: It is a component of a malicious Java archive file (.JAR) that may be dropped or downloaded by other malware. It may
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Installation This Trojan drops the following copies of itself into the affected system: %Windows%\jusched.exe (Note: %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.)
This cracking application generates serial numbers to crack into programs that need valid serial numbers for the programs to function fully. It uses a user interface (UI). Cracker Routine This
It poses as a component file of an audio player software. It requires the audio player software in order to perform its intended routine. This Trojan arrives as a file that exports the functions of
This Trojan exploit targets a known vulnerability in <i>Microsoft Office Word</i> with the way it handles specially crafted .RTF document files. In addition, it also uses