Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 4661 - 4680
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This is the Trend Micro detection for .XLS files that has embedded malicious .SWF . This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan
Installation This Trojan drops and executes the following files: %Program Files%\Internet Explorer\setupapi.dll - detected as TROJ_DLOAD.QKLW (Note: %Program Files% is the default Program Files
This Trojan may be dropped by other malware. It may be injected into processes running in memory. Arrival Details This Trojan may be dropped by other malware. Installation This Trojan adds the
This Trojan may arrive bundled with malware packages as a malware component. It may be dropped by other malware. However, as of this writing, the said sites are inaccessible. It is injected into all
This Trojan has received attention from independent media sources and/or other security firms. In particular, it takes advantage of the Epsilon data-breach incident that was reported in the media. To
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. It deletes itself after execution. Dropping Routine This Trojan
This Trojan arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation This Trojan drops the following copies of itself into the affected system: %User Temp%\lzg.tmp (Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and
This Trojan creates a folder in affected systems. Installation This Trojan creates the following folders: %User Profile%\Application Data\Microsoft\Media Player\DRM251 (Note: %User Profile% is the
However, due to errors in its code, it fails to perform its intended routine. Download Routine This Trojan takes advantage of the following software vulnerabilities to download possibly malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. As of this
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. Download Routine This Trojan takes advantage of the following software vulnerabilities
This Trojan exploits a known vulnerability in Adobe Reader and Acrobat in order to drop BKDR_TIDSERV.DM. As a result, the malicious routines of this backdoor are also exhibited on the infected
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically,it takes advantage of a vulnerability in the method
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It is a specially crafted PDF file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: WORM_QAKBOT family Other Details This Trojan does the following: It is an encrypted
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It adds certain registry entries to disable the Task Manager. This