Keyword: Mal_SageCrypt
3778 Total Search   |   Showing Results : 101 - 120
This worm arrives via removable drives. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
The dropped AUTORUN.INF is detected by Trend Micro as Mal_Otorun2. This worm arrives by connecting affected removable drives to a system. It uses Windows Task Scheduler to create a scheduled task
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: REVETON RANSOM If your Trend Micro
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_VOBFUS If your Trend Micro
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_VOBFUS If your Trend Micro
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm adds registry entries to enable its automatic execution at every system startup. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_DROPPER.OKQ Autostart Technique This Trojan adds the following registry entries
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. Arrival Details This Trojan may be downloaded by other malware/grayware/spyware
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It requires its main component to successfully perform its
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This worm drops the following copies of itself
This worm uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of of
The dropped AUTORUN.INF is detected by Trend Micro as Mal_Otorun1. This worm arrives as attachment to mass-mailed email messages. It arrives via removable drives. It drops an AUTORUN.INF file to
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: Poison If your Trend Micro product
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: ALS_BURSTED ACM_BURSTED If your Trend