Keyword: MAL_VUNDO-4
68453 Total Search   |   Showing Results : 381 - 400
This Trojan connects to certain URLs to send and receive commands from a remote malicious user. It terminates processes, some of which are related to system security. This Trojan arrives on a system
adds the following registry entries: HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ untukmu2\version me = "4" HKEY_CURRENT_USER\Software\VB and VBA Program Settings\ titta\version me = "4
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
The dropped AUTORUN.INF is detected by Trend Micro as Mal_OtorunG. This worm arrives by connecting affected removable drives to a system. It drops an AUTORUN.INF file to automatically execute the
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: ANDROM BUNDPIL GAMARUE If your Trend
This is the Trend Micro detection for ISO image files observed to be used by malware families such as NANOCORE, FAREIT, LOKI, and NEGASTEAL. It is used as an archive-like container, similar to .ZIP,
following copies of itself into the affected system: %System Root%\system32\891249\154\2\4\52\34\5\5\2\34\5\234\5234\523452345\234\52345\23462\362\34\6523\452\346\234\52\345\24\624\36\234\62\346\2346\23\46
following copies of itself into the affected system: %System Root%\system32\891249\154\2\4\52\34\5\5\2\34\5\234\5234\523452345\234\52345\23462\362\34\6523\452\346\234\52\345\24\624\36\234\62\346\2346\23\46
following copies of itself into the affected system: %System Root%\system32\891249\154\2\4\52\34\5\5\2\34\5\234\5234\523452345\234\52345\23462\362\34\6523\452\346\234\52\345\24\624\36\234\62\346\2346\23\46
following copies of itself into the affected system: %System Root%\system32\891249\154\2\4\52\34\5\5\2\34\5\234\5234\523452345\234\52345\23462\362\34\6523\452\346\234\52\345\24\624\36\234\62\346\2346\23\46
following copies of itself into the affected system: %System Root%\system32\891249\154\2\4\52\34\5\5\2\34\5\234\5234\523452345\234\52345\23462\362\34\6523\452\346\234\52\345\24\624\36\234\62\346\2346\23\46
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
(Windows Server 2008 R2 for x64-based Systems Service Pack 1),Microsoft .NET Framework 4 (Windows XP Service Pack 3),Microsoft .NET Framework 4 (Windows XP Professional x64 Edition Service Pack 2),Microsoft
Framework. Microsoft .NET Framework 4 on Windows XP Service Pack 3,Microsoft .NET Framework 4 on Windows XP Professional x64 Edition Service Pack 2,Microsoft .NET Framework 4 on Windows Server 2003 Service
This Worm drops a file in the Windows Common Startup folder to enable its automatic execution at every system startup. It terminates certain processes if found running in the affected system's