Keyword: usoj_regin.sm
1485 Total Search   |   Showing Results : 501 - 520
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It drops an AUTORUN.INF file to
For its propagation routines, it is capable of dropping a copy of itself to default shares in the network. It then starts a service to execute the dropped file. It also attempts to access certain
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This backdoor may be
This Trojan takes advantage of software vulnerabilities to allow a remote user or malware/grayware to download files. Download Routine This Trojan takes advantage of the following software
This Trojan may arrive bundled with malware packages as a malware component. It may be dropped by other malware. Arrival Details This Trojan may arrive bundled with malware packages as a malware
It takes advantage of the Use-after-free vulnerability in the Peer Objects component in Microsoft Internet Explorer to download possibly malicious files. This Trojan may be hosted on a website and
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It registers itself as a Browser Helper Object (BHO) to ensure its automatic
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It executes then deletes itself
This worm drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation
This Trojan arrives as a component bundled with malware/grayware packages. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. However, as of this writing, the said sites are inaccessible. It is a component of other malware. Arrival Details
This is the Trend Micro detection for configuration files of the TSPY_SPYEYE malware family. This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by
This specially crafted PDF file drops and execute a malicious file, game.exe. The dropped file is detected by Trend Micro as WORM_EMOTI.A. This Trojan arrives as an attachment to email messages
This worm accesses websites to download files detected by Trend Micro as: TROJ_FAKEAV.SM8 TROJ_RIMECUD.DL WORM_RIMECUD.SMC This worm arrives via removable drives. It drops an AUTORUN.INF file to
This Trojan executes when a user accesses certain websites where it is hosted. As of this writing, the said sites are inaccessible. Arrival Details This Trojan executes when a user accesses certain
This Trojan drops the files. Installation This Trojan creates the following folders: C:\Documents and Settings\All Users\Application Data\adhhh Dropping Routine This Trojan drops the following files:
This is Trend Micro detection for Master Boot Record (MBR) infected by TDSS family. The main TDSS component modifes the Master Boot Record of a system to execute its malicious file components stored
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It may be injected into processes running in memory. It requires its main component to
This malware is dropped by TROJ_ADOBFP.SMA. It checks if proxy is enabled on the affected system by checking certain registry entries. It connects to certain malicious servers and URLs, and waits for
This Trojan may arrive bundled with malware packages as a malware component. It executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user