Keyword: usoj_regin.sm
1483 Total Search   |   Showing Results : 101 - 120
This file infector infects by inserting its code to unused space in host files. Autostart Technique This file infector drops the following file(s) in the Windows Startup folder to enable its
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays fake alerts that warn users of infection. It
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This worm may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies registry entries to hide files with System and Read-only
This malware is created by a toolkit known as Blackshades. The functions of this malware is similar to a RAT that can steal information, launch denial of service (DoS) attacks, and download malware
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It bypasses the Windows firewall. This allows the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Arrival Details This malware arrives via the following means: Patched by other malware (TROJ_ZEKOS.B) Other Details This Trojan requires the following additional components to properly run: %System%\
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses Windows Task Scheduler to create a scheduled task
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Exploit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/0210201014951.jpeg What is STUXNET? STUXNET is a worm that initially made news in July due to its use of certain vulnerabilities to propagate and
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This Trojan displays fake alerts upon installation. It displays fake scanning results about disk errors. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
NOTES: This is the Trend Micro detection for Win32 Self-Extracting Cabinet files created by WORM_ACKANTTA.C. The said file contains a copy of WORM_ACKANTTA.C using the filename SnowFairye.EXE , and
This Trojan may arrive as a file that exports functions used by other malware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan contains logs related to the malicious activities of its main component. This Trojan arrives as a component bundled with malware/grayware packages. It may be dropped by other malware.
This Trojan is believed to be related to a targeted attack against infrastructures and companies located in the Middle East. To get a one-glance comprehensive view of the behavior of this Trojan,
This backdoor arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when