Keyword: expl_cplnk.sm
1601 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: WORM_OTORUN.ASH WORM_SALITY.RL TROJ_ZBOT.BXW WORM_WEBMONER.JC WORM_OTORUN.KR NOTES:
Explorer.lnk - autostart component detected as EXPL_CPLNK.SM %Common Startup%\Microsoft Update.lnk - autostart component detected as EXPL_CPLNK.SM %Favorites%\Microsoft Update.lnk - autostart component detected
malicious LNK file detected by Trend Micro as EXPL_CPLNK.SM NOTES: This Trojan arrives on the system using the following name: {random file name}.tmp It contains the encyrpted copy of the mother file of
LNK_OTORUN.SM pornmovs.lnk - LNK_OTORUN.SM {malwarename}.lnk - EXPL_CPLNK.SM Deletes the %system%\drivers\etc\hosts
contains a .LNK file ( EXPL_CPLNK.SM ) and a .DLL file ( TROJ_ZBOT.BXW ). WORM_SALITY.RL also took advantage of the vulnerability as part of its routine. This file infector may be downloaded from malicious
System to avoid early detection. It also adds the following files in the said drives: ert.dll - detected as TROJ_ZAPCHAST.LA {random file name}.lnk - detected as EXPL_CPLNK.SM
LNK_STUXNET.C EXPL_CPLNK.SM The STUXNET worm itself is detected as: WORM_STUXNET.A WORM_STUXNET.SM The rootkit component is similarly detected as RTKT_STUXNET.A. In addition, Trend Micro offers virtual patching
This worm poses as a font file and uses the LNK vulnerability to propagate. There has also been an increase in customer infection because of this malware. To get a one-glance comprehensive view of
This is the Trend Micro detection for files that propagate via vulnerablity in Windows Shell that could allow arbitrary commands to be executed. This Worm drops file(s)/component(s) detected as
This worm deletes registry entries, causing some applications and programs to not function properly. It drops copies of itself in all removable drives. It deletes itself after execution. Installation
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It may be dropped by other malware. It drops an AUTORUN.INF file to
Trend Micro has flagged this file infector as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the behavior of
This malware has a complex and evolving structure and behavior. This .LNK file is used to execute the main component of the malware detected as WORM_TDSS.TX. It exploits a vulnerability in Windows
Trend Micro has flagged this worm as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it has a complex structure that enables it to evolve
This Trojan arrives via removable drives. It may be dropped by other malware. Arrival Details This Trojan arrives via removable drives. It may be dropped by other malware. Installation This Trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download