Keyword: troj_crypctb
44669 Total Search   |   Showing Results : 4821 - 4840
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. As
This Trojan deletes itself after execution. Installation This Trojan drops the following copies of itself into the affected system: %User Temp%\AcroRD32.exe (Note: %User Temp% is the current user's
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Trend Micro detects the said file as BKDR_BAMITAL.WQ. As a result, routines of the said backdoor are also exhibited on the infected system. This Trojan may be dropped by other malware. It is used to
Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it uses techniques that does not need
This Trojan arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This Trojan connects to a possibly malicious URL. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan may gather system information. It may connect to a URL to send and recieve information from a remote user and to inform the remote user of an infection. It may also do this to download
This Trojan requires its main component to successfully perform its intended routine. Other Details This Trojan requires its main component to successfully perform its intended routine. It does the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan may be dropped by other malware. It deletes itself after execution. Arrival Details This Trojan may be dropped by the following malware: TROJ_PIDIEF.WM Installation This Trojan drops the
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It attempts to steal sensitive online banking information, such as user
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CLASSES_ROOT\CLSID\{AFD4AD01-58C1-47DB-A404-FBE00A6C5486}
This Trojan may arrive as a file that exports functions used by other malware. It opens a hidden Internet Explorer window. It requires its main component to successfully perform its intended routine.
This Trojan displays fake alerts that warn users of infection. It also displays fake scanning results of the affected system. It then asks for users to purchase it once scanning is completed. If
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the said sites are inaccessible. Arrival
This malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain
This Trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it takes advantage