• This malware steals designs and drawings from affected users. It also steals the .
    Read more   

  • Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, this malware is one of the "Printer Virus" that print several lines of characters when executed in an infected machine.
    Read more   

  • Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, this malware is one of the "Printer Virus" that print several lines of characters when executed in an infected machine.
    Read more   

  • Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, this malware is one of the "Printer Virus" that print several lines of characters when executed in an infected machine.
    Read more   

  • This malware is one of the 'Printer Virus' that prints several lines of characters when executed. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware exploits the vulnerability in Microsoft XML Core Services, which prompted Microsoft to release a fix tool. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware contains a malicious library file that when executed, turns the infected device into a zombie device. It also hides its routines in the dynamic library, which makes it hard to analyze.
    Read more   

  • This malware exploits a vulnerability in CVE-2012-1875, which is addressed in MS12-037 bulletin. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This backdoor disguises as a revolutionary document in order to lure Syrian activists into downloading and executing the malware.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This malware is a Trojanized proxy tool used for bypassing censorship that targets Iranian users.To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more