Search
Keyword: troj_crypctb
It enumerates running services and randomly chooses a service name to use as its file name. This Trojan may be dropped by other malware. It adds registry entries to enable its automatic execution at
This Trojan may be dropped by other malware. It modifies registry entries to enable its automatic execution at every system startup. Arrival Details This Trojan may be dropped by the following
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. Installation This Trojan drops the following files: %User Profile%\Application Data\fs.mp3
It takes advantage of certain vulnerabilities. Dropping Routine This Trojan drops the following files: %User Temp%\winword.exe - detected as TROJ_DINGU.B (Note: %User Temp% is the current user's Temp
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it exploits a 0-day vulnerability in Adobe Flash
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. It also uses social engineering methods to lure users into
It may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival Details It may be dropped
To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan arrives as attachment to mass-mailed email messages. It may be downloaded
It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details It may be dropped by other malware. It may be unknowingly downloaded
It may be unknowingly downloaded by a user while visiting malicious websites. It arrives as attachment to mass-mailed email messages. It executes the dropped file(s). As a result, malicious routines
This malware exploits a software vulnerability in order to drop a malicious file onto the affected system. It also drops and opens a document file in order to hide its malicious routines. Once a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies system files, disabling system programs from
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be dropped by other malware. It may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan uses common file icons to trick a user into thinking that the files are legitimate. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on
Related malware is TROJ_DLOADR.SMVE This Trojan deletes itself after execution. Installation This Trojan drops the following files: %System%\thxr.wgo - detected as TROJ_DLOADR.SMVE (Note: %System% is
This Trojan may be dropped by other malware. It opens a hidden Internet Explorer window. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped
It drops a .SYS file, which is an encrypted file decrypted by its main component in memory to perform its intended routine. When successfully installed on the affected system, it may connect to the