Search
Keyword: Mal_SageCrypt
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This worm drops the following copies of itself
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_PALEVO WORM_RIMECUD WORM_SILLY
This Trojan executes commands from a remote malicious user, effectively compromising the affected system. Installation This Trojan drops the following copies of itself into the affected system:
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: RTKT_ZACCESS BKDR_ZACCESS If your Trend Micro product
This is the Trend Micro detection for files patched and partially overwritten with malicious code of the ZACCESS (ZEROACCESS) malware family. For more information on the routines of the ZACCESS
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: FAKEAV If your Trend Micro product
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_DNSCHANG TROJ_GAMETH Heuristic Detection This is the
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_AGENT WORM_RBOT TROJ_MANCYSN If
This is Trend Micro detection for LNK files created by VOBFUS malware family as an autostart component. These LNK files are created in removable drives to allow automatic execution of the VOBFUS
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_SIREFEF If your Trend Micro
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: JS_GUMBLAR If your Trend Micro product detects a file
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: BEDEP If your Trend Micro product
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TSPY_ONLINEG TSPY_LINEAGE TSPY_LEGMIR
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_VUNDO TSPY_VUNDO If your Trend
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a