Keyword: troj_hydraq.sma
44862 Total Search   |   Showing Results : 221 - 240
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself in all removable drives. It
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This backdoor may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. It inserts an IFRAME
Other Details Based on analysis of the codes, it has the following capabilities: This is the Trend Micro detection for .EXE files that have been prepended by a malicious script tag.
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan executes when a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This worm creates folders where it drops its files. It uses the default Windows folder icon to trick users into opening the file. Double-clicking the file executes this malware. It drops copies of
This Trojan accesses websites to download files. This action allows this malware to possibly add other malware on the affected computer. Download Routine This Trojan accesses websites to download the
This malware is a component of another malware. It attaches itself to certain processes. It monitors the browsing activities of the user. It exectures certain commands from a remote malicious user.
Other Details Based on analysis of the codes, it has the following capabilities: Accesses URL(s) and redirects users to possibly malicious sites upon execution.
As of this writing, the said sites are inaccessible. It inserts an IFRAME tag that redirects users to certain URLs. Download Routine As of this writing, the said sites are inaccessible. Other Details
This unknown may arrive bundled with malware packages as a malware component. It may be dropped by other malware. This is the Trend Micro detection for files that exhibit certain behaviors. Arrival
This malware has a complex and evolving structure and behavior. This .LNK file is used to execute the main component of the malware detected as WORM_TDSS.TX. It exploits a vulnerability in Windows
This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website. As of this writing, the said sites are
This Trojan may be dropped by other malware. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were