Search
Keyword: troj_cryptesla
The malicious files <i>flash32.exe</i> and <i>kbflashUpd.dll</i> are detected as TROJ_FLASHUP.A and TROJ_FLASHUP.B, respectively. These are the
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/31122009122650.jpeg How does this threat get into users' systems? Spammed messages lure users into downloading an electronic game related to the 2009
This Trojan downloads updated copies of itself from certain websites. It redirects searches to a specific IP address if the search engine URL contains certain strings. This Trojan may be dropped by
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
Upon execution, this worm drops files on the affected system. This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This malware shares code similarities with the STUXNET malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This is the Trend Micro
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This is the detection for the payload related to the Hacking Team Flash zero-day affecting latest version of Flash in Windows, Mac, and Linux. Once this zero-day vulnerability has been successfully
This destructive malware causes massive data loss. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. For the related story, you may read
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables antivirus services. This is done to allow
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. It deletes itself after execution. Installation This Trojan adds
TROJ_PEYKE.B may arrive as dropped files of another malware. It may arrive with component files all detected as TROJ_PEYKE.B. It creates a file where it uses for its keylogging routines. Another
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It deletes itself after execution. Installation This Trojan
This Trojan arrives as a component bundled with malware/grayware packages. It may be dropped by other malware. Arrival Details This Trojan arrives as a component bundled with malware/grayware
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the behavior of this
It accesses websites to download files detected as TROJ_PIKER.AC and TROJ_VB.MAN. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious
This Trojan executes then deletes itself afterward. Installation This Trojan drops the following file(s)/component(s): %User Temp%\AUTMGR32.EXE - detected as TROJ_FAKEAV.SMEV %User Temp%
It drops TROJ_GORIADU.SMX and TROJ_GORIADU.SMZ. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the dropped file