Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 4701 - 4720
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. Other Details Once a malware successfully exploits the said vulnerability, it causes
Other Details This Trojan does the following: It executes the file ucure\ucure32.exe - detected as TROJ_FRAUDLO.MN Executes another malware
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It executes the files it drops, prompting the affected system to exhibit the malicious routines they contain.
This Trojan may be downloaded by other malware/grayware from remote sites. It saves downloaded files into the said created folder. Arrival Details This Trojan may be downloaded by the following
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan may be downloaded by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It connects to certain websites to send and receive information. It
Installation This Trojan drops the following copies of itself into the affected system: %System%\3361\svchost.exe (Note: %System% is the Windows system folder, which is usually C:\Windows\System on
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It installs a fake antivirus/antispyware software. It displays fake alerts that warn users of infection. It also
This Trojan may arrive bundled with malware packages as a malware component. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a
This Trojan may be dropped by other malware. It executes the files it drops, prompting the affected system to exhibit the malicious routines they contain. Arrival Details This Trojan may be dropped
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. It deletes itself after execution. Dropping Routine This Trojan
This Trojan may be downloaded by other malware/grayware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It may be downloaded from remote sites by
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Dropping Routine This Trojan drops the following files: %User
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
It opens the non-malicious URL http://www.irs.gov/pub/irs-pdf/f941.pdf to hide its malicious routines from the user. It registers the downloaded .DLL file as a Browser Helper Object (BHO) by
This Trojan may be downloaded by other malware/grayware from remote sites. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
Changes the TCP Port of Internet Information Services (IIS) of the affected system to a new random number. The new port number is saved by the malware in a specific registry. This Trojan may be