Keyword: mal_naix-3
70046 Total Search   |   Showing Results : 21 - 40
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
The dropped AUTORUN.INF is detected by Trend Micro as Mal_Otorun1. This worm arrives as attachment to mass-mailed email messages. It arrives via removable drives. It drops an AUTORUN.INF file to
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This backdoor connects to certain URLs to send and receive commands from a remote malicious user. It terminates processes, some of which are related to system security. This backdoor arrives via
The dropped AUTORUN.INF file is detected by Trend Micro as Mal_Otorun1. This worm arrives as attachment to mass-mailed email messages. It arrives via removable drives. It drops an AUTORUN.INF file to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
NOTES: This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: Qakbot Files detected as MAL_QAKCFG1 are usually
NOTES: This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: BKDR_PCCLIENT If your Trend Micro product detects
NOTES: This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_BAGEL WORM_MYTOB WORM_NETSKY If your Trend
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN OTORUN Since these files commonly arrive and
default value data of the said registry entry is {user-defined} .) HKEY_USERS\.DEFAULT\Software\ Microsoft\Windows\CurrentVersion\ Internet Settings\zones\3 CurrentLevel = "0" (Note: The default value data
This Trojan connects to certain URLs to send and receive commands from a remote malicious user. It terminates processes, some of which are related to system security. This Trojan arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: HTML_IFRAME VBS_PSYME JS_AGENT If
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_AGENT TROJ_SMALL TROJ_DROPPER If
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_VOBFUS If your Trend Micro
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file
This spyware may be dropped by other malware. It connects to certain websites to send and receive information. Arrival Details This spyware may be dropped by the following malware: SWF_EXPLOIT.PB
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm