Keyword: Mal_SageCrypt
3778 Total Search   |   Showing Results : 1101 - 1120
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. Arrival
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a
This is the Trend Micro detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_DELF If your Trend Micro product detects a file under this
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
Installation This Trojan drops the following files: %Windows%\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job - autostart component (Note: %Windows% is the Windows folder, which is usually C:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan displays fake alerts that warn users of infection. It also displays fake scanning results of the affected system. It then asks for users to purchase it once scanning is completed. If
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is the Trend Micro detection for suspicious files that manifest similar behavior and characteristics as the following malware: HTML_ADODB HTML_AGENT HTML_DLOADER HTML_IESLICE HTML_IFRAME
This Trojan may arrive bundled with malware packages as a malware component. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may arrive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware/spyware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes registry entries, causing some applications
This Trojan deletes itself after execution. Installation This Trojan drops the following copies of itself into the affected system: %Application Data%\{random folder name}\{random file name}.exe
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain memory
This Trojan may arrive bundled with malware packages as a malware component. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may arrive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This worm may be dropped by other malware. Arrival Details This worm may be dropped by other malware. Other System Modifications This worm modifies the following registry entries: HKEY_CURRENT_USER