Keyword: usoj_regin.sm
1483 Total Search   |   Showing Results : 41 - 60
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It may be dropped by other malware. It drops an AUTORUN.INF file to
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan may be downloaded from several remote sites. It may also be downloaded from links in email messages sent out by WORM_KELIHOS.SM. It connects to website to download and execute a malicious
This worm deletes registry entries, causing some applications and programs to not function properly. It drops copies of itself in all removable drives. It deletes itself after execution. Installation
This is the Trend Micro detection for files that propagate via vulnerablity in Windows Shell that could allow arbitrary commands to be executed. This Worm drops file(s)/component(s) detected as
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/186201284935.jpeg What is the Printer Virus? “Printer Virus” is a name collectively given to several malware that resulted in a number of reported
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/1311201163258.jpeg What is RTKT_ZACCESS? RTKT_ZACCESS is a rootkit component bundled with other malware such as FAKEAV. RTKT_ZACCESS, or ZACCESS
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/2611201045724.jpeg How do users get this Web threat? The threat arrives via a spoofed email message from Microsoft with the subject "Microsoft
This backdoor connects to a certain URL to send and receive commands from a remote malicious user. It gathers certain information and sends the gathered information via HTTP POST to a specific URL.
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It deletes the initially executed copy of itself.
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be dropped by other malware. Arrival Details This Trojan may be unknowingly downloaded by a user while
This Trojan encrypts files. When a user clicks on an encrypted file, the following image is displayed: This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This worm uses Remote Desktop Protocol (RDP) for its propagation routines. This worm registers ntshrui.dll (copy of clb.dll) as a service by creating the a certain registry. It then adds this service
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It connects
This malware is believed to be the bot used by a hacking group that perpetrated attacks against Brazilian websites. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. Arrival Details
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a