Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 4761 - 4780
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the downloaded files. As a
This is the Trend Micro detection for Win32 Self-Extracting Cabinet files created by WORM_PROLACO.EK. The said file contains a copy of WORM_PROLACO.EK and an .EXE or .MSI file, which it finds in
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
It conceals it's creator's identity when performing malicious activities. It does this by hiding his/her real location when issuing request(s).It also performs DNS requests to a certain site. As of
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This Trojan bears the file icons of certain applications to avoid easy detection and consequent removal. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. It deletes itself after execution. Installation This Trojan drops
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan requires its main component to successfully perform its intended routine. Other Details This Trojan requires its main component to successfully perform its intended routine. It does the
This Trojan connects to the certain URL(s) to download its component file(s). Installation This Trojan injects threads into the following normal process(es): Explorer.exe Autostart Technique This
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites. It may be
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the dropped file(s). As a
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Installation This Trojan drops the following copies of itself into
This Trojan deletes itself after execution. Installation This Trojan drops the following files: %System%\smslauc.dll - non-malicious files (Note: %System% is the Windows system folder, which is
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes then deletes itself afterward. Arrival Details This Trojan may
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also