Keyword: bec_suspicious.ers
2854 Total Search   |   Showing Results : 1441 - 1460
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
files and running processes of the system informations on drives and disk spaces a variant of Win32/Agent.OYA trojan (NOD32), Suspicious file (Panda)
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics of backdoor malware. If your Trend Micro product detects a file under this
This is a Trend Micro heuristic detection for Microsoft Office Excel documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute
This is a Trend Micro generic detection for Microsoft Office Powerpoint documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute
This is a Trend Micro generic detection for Microsoft Office Word documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
This is a Trend Micro heuristic detection for suspicious Portable Document files (PDF) with embedded JavaScripts that may exploit vulnerabilities. If your Trend Micro product detects a file under
are inaccessible as of this writing. Rogue Antivirus Routine This Trojan displays the following fake alerts: The website contains exploits that can launch a malicious code on your computer. Suspicious
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: BEDEP If your Trend Micro product
adware has the ability to make calls in the background without user consent. Furthermore, the SDK contains code to delete the device's call history to hide the suspicious activity. The Fine Line Between Ad
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TSPY_ONLINEG TSPY_LINEAGE TSPY_LEGMIR
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TSPY_MAGANIA (also known as GAMETHI,
contain malicious IFRAME tags. Trojan:Win32/Jpgiframe.A (Microsoft); Trojan.JPG.IframeRef (Ikarus); HTML/IFRAME.gen (F-prot); Suspicious IFrame.d (McAfee)
This is the Trend Micro generic detection for files exhibiting suspicious behavior that may cause harm to systems. Trojans are a general malware classification for malicious files, applications, or
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is the Trend Micro generic detection for files exhibiting suspicious behavior that may cause harm to systems. Trojans are a general malware classification for malicious files, applications, or
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_KOVTER TSPY_KOVTER If your Trend
Trojan requires its main component to successfully perform its intended routine. Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a