Keyword: usoj_plugx.sme
458 Total Search   |   Showing Results : 261 - 280
This worm may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This malware is possibly connected with DUQU malware, which shares code similarities in STUXNET malware. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This report is for multiple detected samples. This backdoor arrives contained inside a self-extracting archive (RAR SFX) and attached in email messages. The SFX drops and execute the malware. It also
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
The dropped AUTORUN.INF file is detected by Trend Micro as Mal_Otorun1. This worm arrives as attachment to mass-mailed email messages. It arrives via removable drives. It drops an AUTORUN.INF file to
This cryptoransomware variant was discovered to be involved in a series of malicious campaigns that found victims in Europe, China, Middle East, Africa, India, and Latin America on late January 2015.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives via peer-to-peer (P2P) shares. It arrives via removable drives. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This is Trend Micro's smart detection for a group of FAKEAV variants. This is the Trend Micro detection for files that exhibit certain behaviors. It displays fake alerts that warn users of infection.
This spyware arrives as an attachment to spammed messages. It arrives as a malicious macro code. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram
This is the Trend Micro detection for shortcut (.LNK) files created by WORM_DORKBOT. This malware may be dropped by other malware. Arrival Details This malware may be dropped by the following
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Worm arrives by connecting affected removable drives to a system. It may arrive bundled with malware packages as a malware component. It may be unknowingly downloaded by a user while visiting
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware/spyware