Keyword: troj_hydraq.sma
44862 Total Search   |   Showing Results : 321 - 340
This Others may be dropped by other malware. This is the Trend Micro detection for files that exhibit certain behaviors. Arrival Details This Others may be dropped by the following malware: CRYSIS
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Since the start of April, we have observed numerous spam emails written in different languages. These spam messages claim that the user's invoice is attached in the mail. The attachment is a
HTML_CLICKR.SMA inserts an IFRAME tag that redirects users to this URL.
HTML_CLICKR.SMA inserts an IFRAME tag that redirects users to this URL.
HTML_CLICKR.SMA i nserts an IFRAME tag that redirects users to this URL.
HTML_CLICKR.SMA i nserts an IFRAME tag that redirects users to this URL.
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This worm arrives as an attachment to email messages spammed by other
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
Trend Micro has flagged this worm as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it has a complex structure that enables it to evolve
Trend Micro has flagged this hacking tool as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it is used to generate malicious scripts that
This worm uses Remote Desktop Protocol (RDP) for its propagation routines. To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown below. This worm
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded from remote sites by other
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This adware arrives as a component bundled with malware/grayware packages. It may be manually installed by a user. Arrival Details This adware arrives as a component bundled with malware/grayware
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following file(s)/component(s):
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following component file(s):
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: JS_BONDAT.F JS_BONDAT.SM JS_BONDAT.SMA NOTES: This is the Trend Micro detection for