Keyword: html_comle.cxc
5707 Total Search   |   Showing Results : 1 - 20
   Next  
This is the detection for the Java zero-day exploit (designated with CVE-2015-2590) that was used in the targeted attack campaign, Operation Pawn Storm. Once successfully exploited, it downloads
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives by connecting affected removable drives to a system. It automatically executes files when a user opens a drive. Arrival Details This Trojan arrives by connecting affected
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the
This Trojan connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is the detection for the second stage malware related to the new Java zero-day exploit which was used in the targeted attack campaign, Operation Pawn Storm. In the second stage of the attack, it
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This is the detection for the third stage malware related to the new Java zero-day exploit that was used in the targeted attack campaign, Operation Pawn Storm. In the first stage of the infection
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Description Name: APT - SEDNIT - HTTP (Request) - Variant 4 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are s...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This spyware may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It retrieves specific information from the affected system. Arrival Details This
\DECRYPT_YOUR_FILES.HTML %User Profile%\S-1-5-18\DECRYPT_YOUR_FILES.HTML %User Profile%\RSA\DECRYPT_YOUR_FILES.HTML %User Profile%\Crypto\DECRYPT_YOUR_FILES.HTML %User Profile%\HTML Help\DECRYPT_YOUR_FILES.HTML %User
\YOUR_FILES_ARE_ENCRYPTED.TXT %Windows%\pchealth\helpctr\System\sysinfo\graphics\YOUR_FILES_ARE_ENCRYPTED.HTML %System%\oobe\html\mouse\images\YOUR_FILES_ARE_ENCRYPTED.TXT %System%\oobe\html\mouse\images
%\oobe\html\mouse\images\YOUR_FILES_ARE_ENCRYPTED.HTML %System%\oobe\images\YOUR_FILES_ARE_ENCRYPTED.HTML %Windows%\Web\Wallpaper\YOUR_FILES_ARE_ENCRYPTED.HTML %User Profile%\