Keyword: troj_cryptesla
44814 Total Search   |   Showing Results : 1021 - 1040
This Trojan moves .LNK files to the created folder %User Temp%\smtmp . It also modifies the attributes of files found in the affected system into Hidden , to trick the users that the files have been
This Trojan may be downloaded by other malware/grayware from remote sites. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to
This Trojan may be downloaded by other malware/grayware from remote sites. Arrival Details This Trojan may be downloaded by the following malware/grayware from remote sites: TROJ_MOTMOT.CI Autostart
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be injected into processes running in memory.
This Trojan attempts to replace a system file with a copy of itself. This results to the crash of the affected computer. This Trojan may be dropped by other malware. It deletes itself after
This Trojan may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This Trojan
This Trojan is a component of other malware. It is responsible for loading a certain service related to its main component. It also has the functionality to create a suspended process, inject
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan retrieves the details of the file it downloads from a certain file. It creates an event. This Trojan may be dropped by other malware. It does not have any propagation routine. It does not
This Trojan may be downloaded by other malware/grayware from remote sites. Arrival Details This Trojan may be downloaded by the following malware/grayware from remote sites: JAVA_DLOADR.MDB It may be
It takes advantage of software vulnerabilities in certain software to drop malicious files. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious
This Trojan is a component used to reconstruct the malware BKDR_PLUGX.AF. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware:
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also
Malware belonging to the SASFIS family are known to be downloaded on systems while visiting sites that have been compromised using a particular exploit pack known as "Eleonore". SASFIS variants are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It takes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This worm executes the files it drops, prompting the affected system to exhibit the malicious routines they contain. Arrival Details This worm may arrive via network shares. Installation This worm