Keyword: usoj_regin.sm
1485 Total Search   |   Showing Results : 461 - 480
File Infection This is the Trend Micro detection for files infected by: PE_GWAPOMI.A-O
This Trojan is noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it exploits a zero-day vulnerability in Adobe Flash Player in order to drop
This Trojan uses common file icons to trick a user into thinking that the files are legitimate. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
Other Details This Trojan is a zero-day exploit for the following vulnerability: Help and Support Center More information on this vulnerability can be found below:
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This malware directs browsers to porn sites. This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This is Trend Micro's detection for ZeroAccess rootkit component. Once running, it checks if its service name starts with '.', if not, it will not continue. It then searches for a certain registry
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. It is a component of other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This is the Trend Micro detection for encrypted configuration files of TSPY_SPYEYE malware. It contains a list of targeted sites such as banking sites, mail servers and social networking sites.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan accesses or redirects users to sites that contains sexually explicit imagery, i.e. adult pornography sites. This Trojan may be hosted on a website and run when a user accesses the said
This worm may be dropped by other malware. Arrival Details This worm may be dropped by other malware. NOTES: This worm tries to open the file \\TsClient\A\Moto if it is running in rundll32.dll . If