Keyword: Possible_OLGM-23
16374 Total Search   |   Showing Results : 1421 - 1440
This malware has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the behavior of this
This is a Trend Micro detection for specially crafted .JPG, .PNG, .SWF, .PDF, .BMP and .GIF picture files that contains an iframe pointing to the possibly malicious websites. This Trojan arrives as
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This Trojan arrives as a file that exports the functions of other malware/grayware. It may be dropped by other malware. It connects to certain URLs. It may do this to remotely inform a malicious user
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
This Trojan is a component of other malware. Installation This Trojan drops the following copies of itself into the affected system: ZASRAKOMONDOHUI31338.EXE It injects itself into the following
This spyware may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. Arrival Details This spyware may be dropped by other malware. It arrives as a component
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This worm arrives via removable drives. It may be dropped by other malware. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected
This worm arrives by connecting affected removable drives to a system. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It drops
This is the Trend Micro detection for Damaged variants of the X97M_EXTRASJ malware family. NOTES: This is the Trend Micro detection for Damaged variants of the X97M_EXTRASJ malware family. Files
This Trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of an
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CLASSES_ROOT (default) = {malware path and filename} Other System
Installation This worm drops the following copies of itself into the affected system: %System Root%\RECYCLER\{SID}\syitm.exe (Note: %System Root% is the root folder, which is usually C:\. It is also
This backdoor creates folders where it drops its files. It opens a hidden Internet Explorer window. Installation This backdoor drops the following copies of itself into the affected system: %system%
Installation This spyware drops the following non-malicious file: %System%\Xpocx.ocx (Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT
When visited, this HTML displays a certain message. It then redirects to a specific URL. This then leads to other site redirections, which then displays a fake video. Clicking anywhere on the webpage