Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 4341 - 4360
It adds registry entries as part of its installation routine. It drops the files. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. Other
This Trojan is a component of other malware. Installation This Trojan is a component of other malware. NOTES: Other Details Based on analysis of the codes, it has the following capabilities: It may
Other System Modifications This Trojan adds the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Tracing\BAP HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Tracing\PPP HKEY_LOCAL_MACHINE
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It takes
It takes advantage of vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). After successfully exploiting the said vulnerability, it drops a file detected as
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware displays a fake login screen in an attempt to steal login information from the user. It connects to malicious URLs in order send and retrieve data. This spyware may be downloaded by
Other Details This Trojan displays the following images: It does the following: It opens Internet Explorer and connects to the following Google search query: http://www.google.com/search?q
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of software vulnerabilities in certain software to drop malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to download files on the affected machine. Other Details This Trojan takes
This is the Trend Micro detection for files that exhibit certain behaviors. Other Details This is the Trend Micro detection for: AUTORUN.INF component files dropped by WORM_AUTORUN variants. These
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It executes the files it drops, prompting the affected system to exhibit the malicious routines they contain.
This Trojan takes advantage of the following software vulnerabilities to drop malicious files: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930) It also drops files
This Trojan modifies files, disabling programs and applications from properly running. It deletes registry entries, causing some applications and programs to not function properly. It deletes itself
Trend Micro detects the executed file as TROJ_BAMITAL.WQ. As a result, routines of the said Trojan are also exhibited on the affected system. This Trojan is used to load and execute a file. Arrival
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CLASSES_ROOT\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}
This Trojan requires its main component to successfully perform its intended routine. Other Details This Trojan requires its main component to successfully perform its intended routine. It does the