Keyword: usoj_adobfp.sm
1480 Total Search   |   Showing Results : 41 - 60
This worm arrives by connecting affected removable drives to a system. It adds registry entries to enable its automatic execution at every system startup. Arrival Details This worm arrives by
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be downloaded from several remote sites. It may also be downloaded from links in email messages sent out by WORM_KELIHOS.SM. It connects to website to download and execute a malicious
This is the Trend Micro detection for files that propagate via vulnerablity in Windows Shell that could allow arbitrary commands to be executed. This Worm drops file(s)/component(s) detected as
This worm deletes registry entries, causing some applications and programs to not function properly. It drops copies of itself in all removable drives. It deletes itself after execution. Installation
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It may be dropped by other malware. It drops an AUTORUN.INF file to
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/186201284935.jpeg What is the Printer Virus? “Printer Virus” is a name collectively given to several malware that resulted in a number of reported
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/1311201163258.jpeg What is RTKT_ZACCESS? RTKT_ZACCESS is a rootkit component bundled with other malware such as FAKEAV. RTKT_ZACCESS, or ZACCESS
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/2611201045724.jpeg How do users get this Web threat? The threat arrives via a spoofed email message from Microsoft with the subject "Microsoft
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: PE_SALITY This malware arrives via the following means: This is executed by a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This file infector cenerates pseudorandom alpha characters using a randomizing function, which is computed from the current UTC system date and time. File Infection This is the Trend Micro detection
This worm arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites. It drops an AUTORUN.INF file to automatically
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
When executed, this backdoor drops a .DLL file onto the Windows system folder, and then injects it to a certain system process. It also creates a registry key in order to execute the said .DLL.
This Trojan may arrive as a file that exports functions used by other malware. It arrives as a component bundled with malware/grayware packages. However, as of this writing, the said sites are