Keyword: usoj_flamer.cfg
1615 Total Search   |   Showing Results : 1 - 20
   Next  
This info-stealing malware is dubbed as Flame malware and has been spotted in Iran and other countries since 2010. It is a multi-component threat which makes it hard to analyze. To get a one-glance
This Trojan may be dropped by other malware. This is the Trend Micro detection for files that exhibit certain behaviors. Arrival Details This Trojan may be dropped by the following malware:
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
Microsoft addresses the following vulnerabilities in its June batch of patches: (MS12-036) Vulnerability in Remote Desktop Could Allow Remote Code Execution (2685939) Risk Rating: Critical A
Dubbed as "Mini Flame", this backdoor has similarities to popular malware families such as PLUGX and POISONIVY, which are linked to targeted attacks. To get a one-glance
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes registry entries,
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
%Program Files%\AVAST Software\Avast\gaming_mode_ui.dll %Program Files%\AVAST Software\Avast\gaming_probe.dll %Program Files%\AVAST Software\Avast\aswhook.dll %ProgramData%\AVAST Software\Avast\cfg