Keyword: bec_suspicious.ers
2854 Total Search   |   Showing Results : 1421 - 1440
This is a Trend Micro heuristic detection for Flash files with suspicious ActionsScript that may execute arbitrary files. If your Trend Micro product detects a file under this detection name, do not
This is a Trend Micro generic detection for Microsoft Office Word, Excel, and Powerpoint documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection
This is a Trend Micro heuristic detection for Microsoft Office Word documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TSPY_BANKER TROJ_BANKER If your Trend
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: FAKEAV If your Trend Micro product
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_AGENT WORM_RBOT TROJ_MANCYSN If
This is a Trend Micro generic detection for Microsoft Office documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the file.
This backdoor may be hosted on a website and run when a user accesses the said website. It executes commands from a remote malicious user, effectively compromising the affected system. As of this
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
are mainly seen being involved in spam attacks. PROXY malware are usually downloaded and/or dropped into systems by way of spammed messages with suspicious attachments. It steals the affected computer's
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: DUQU If your Trend Micro product
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_SIREFEF If your Trend Micro
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: Cycbot Kazy If your Trend Micro
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: JS_GUMBLAR If your Trend Micro product detects a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It deletes
NOTES: This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to WORM_PALEVO variants. WORM_PALEVO variants are known to propagate via peer-to-peer
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It creates
This is a Trend Micro heuristic detection for Microsoft Office Word, Excel, and PowerPoint documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_DLOADER TROJ_DLDER TROJ_DLOAD If