Keyword: bec_suspicious.ers
2854 Total Search   |   Showing Results : 1401 - 1420
Win32/Agent.PGE trojan (NOD32), Suspicious file (Panda), TrojanDropper.Agent.fsix (VBA32)
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This is a Trend Micro generic detection for Microsoft Office Excel documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
This is a Trend Micro heuristic detection for Flash files with suspicious ActionsScript that may perform heap spraying to exploit vulnerabilities. If your Trend Micro product detects a file under
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: ALS_BURSTED ACM_BURSTED If your Trend
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: FAKEAV If your Trend Micro product
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: BUZUS If your Trend Micro product
This is a Trend Micro generic detection for Microsoft Office Powerpoint documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This is the Trend Micro heuristic detection for suspicious files that manifest similar
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_ANOMALY If your Trend Micro
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: RTKT_ZACCESS BKDR_ZACCESS If your Trend Micro product
are mainly seen being involved in spam attacks. PROXY malware are usually downloaded and/or dropped into systems by way of spammed messages with suspicious attachments. It steals the affected computer's
This is a Trend Micro generic detection for Microsoft Office Word documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
This is a Trend Micro generic detection for Microsoft Office Excel documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
This is a Trend Micro generic detection for Microsoft Office Excel documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
This hacking tool is used to jailbreak iPhone, iPod touch, and iPad. This hacking tool may be dropped by other malware. It may be manually installed by a user. Arrival Details This hacking tool may
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This is a Trend Micro generic detection for Microsoft Office Word documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. As of