Keyword: usoj_regin.sm
1483 Total Search   |   Showing Results : 121 - 140
This Trojan connects to certain URLs to send and receive commands from a remote malicious user. It terminates processes, some of which are related to system security. This Trojan arrives on a system
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, this malware is one of the "Printer
Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, this malware is one of the "Printer
Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, this malware is one of the "Printer
This is the Trend Micro detection for a 64-bit component of SIREFEF/ZEROACCESS family. This Trojan may arrive bundled with malware packages as a malware component. It may arrive as a file that
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: This is the Trend Micro detection for shortcut (.LNK) files that execute a possibly
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays pop-up advertisements. Arrival Details This
This Trojan may arrive as a file that exports functions used by other malware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies the Internet Explorer Zone Settings. It connects to certain
This malware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This malware arrives on a system as a
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware steals designs and drawings from affected users. It also steals the .PST files on the infected system, which cybercriminals can use for other malicious activities. To get a one-glance
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This malware steals designs and drawings from affected users. It also steals the .PST files on the infected system, which cybercriminals can use for other malicious activities. To get a one-glance
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be injected into processes running in memory.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It opens a random port to allow a remote user to
This hacking tool may arrive bundled with malware packages as a malware component. It may be manually installed by a user. Arrival Details This hacking tool may arrive bundled with malware packages