Keyword: bec_suspicious.ers
2854 Total Search   |   Showing Results : 1341 - 1360
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
Trojan displays the following fake alerts: "Caution! Your computer contains a variety of suspicious programs.Your System requires immediate checking! The system will perform a fast and free check your PC
computer! Most likely causes: The website contains exploits that can launch a malicious code on your computer Suspicious network activity detected There might be an active spyware running on your computer
NOTES: This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: Qakbot Files detected as MAL_QAKCFG1 are usually
This malicious .DLL file monitors the address bar of Internet Explorer and checks if the user tries to visit websites with certain strings. If the website contains any of the above-mentioned strings,
It opens the non-malicious URL http://www.irs.gov/pub/irs-pdf/f941.pdf to hide its malicious routines from the user. It registers the downloaded .DLL file as a Browser Helper Object (BHO) by
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_DLOADER TROJ_DLDER TROJ_DLOAD If
Other Details This adware does the following: This is Trend Micro's generic detection for suspicious files that exhibit adware routines. Adware displays advertising content, often in a manner or
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_AUTOIT If your Trend Micro
Other Details Based on analysis of the codes, it has the following capabilities: This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics
This is the Trend Micro detection for files that exhibit certain behaviors. Other Details This is the Trend Micro detection for: Suspicious files that exhibit adware routines. Adware displays
Other Details This backdoor does the following: This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware:
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN If your Trend Micro
NOTES: This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: Worm_Autorun If your Trend Micro product detects a
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics of rootkit component files of other malware. If your Trend Micro product detects a