Keyword: usoj_regin.sm
1483 Total Search   |   Showing Results : 61 - 80
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself. It
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: PE_SALITY This malware arrives via the following means: This is executed by a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This file infector cenerates pseudorandom alpha characters using a randomizing function, which is computed from the current UTC system date and time. File Infection This is the Trend Micro detection
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
When executed, this backdoor drops a .DLL file onto the Windows system folder, and then injects it to a certain system process. It also creates a registry key in order to execute the said .DLL.
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CLASSES_ROOT\CLSID\{AFD4AD01-58C1-47DB-A404-FBE00A6C5486}
This hacking tool may be used to connect to a machine remotely and perform certain commands. This hacking tool may arrive bundled with malware packages as a malware component. It may be manually
This Trojan may be downloaded from remote sites by other malware. It also has rootkit capabilities, which enables it to hide its processes and files from the user. Arrival Details This Trojan may be
This worm arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites. It drops an AUTORUN.INF file to automatically
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
} = (Note: The default value data of the said registry entry is .) HKEY_CLASSES_ROOT\SM {random}.DocHostUIHandler = (Note: The default value data of the said registry entry is .) HKEY_CURRENT_USER
Trend Micro has flagged this file infector as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the behavior of
This Trojan may be hosted on a website and run when a user accesses the said website. It may be downloaded from remote sites by other malware. Arrival Details This Trojan may be hosted on a website
This Trojan may arrive as a file that exports functions used by other malware. It arrives as a component bundled with malware/grayware packages. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. Arrival