Search
Keyword: usoj_dload.teyjq
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Java Class malware connects to a certain website to remotely execute a file that Trend Micro detects as TROJ_PIDIEF.HBM. As a result, malicious routines of this Trojan are also exhibited on the
This Trojan may arrive bundled with malware packages as a malware component. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected
This Trojan may be dropped by other malware. It may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. It may be dropped by the following malware:
This is the Trend Micro detection for files that exhibit certain behaviors. This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan may be downloaded from remote sites by other malware. It uses common file icons to trick a user into thinking that the files are legitimate. It connects to a website to send and receive
It accesses websites to download files detected as TROJ_PIKER.AC and TROJ_VB.MAN. This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. As of this writing, the said sites are inaccessible. Arrival Details This Trojan arrives
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This Trojan connects to a possibly malicious URL. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. NOTES: This Trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are