Keyword: usoj_flamer.cfg
1615 Total Search   |   Showing Results : 21 - 40
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
\SYSTEM32\CFG %System%\SYSTEM32\LOG (Note: %System% is the Windows system folder, which is usually C:\Windows\System32.) Autostart Technique This spyware adds the following registry entries to enable its
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It modifies the Internet
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This Trojan may be downloaded from the
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be downloaded from
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be downloaded from
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It modifies the Internet
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be downloaded from
\SOFTWARE\Microsoft\ SystemCertificates\ROOT\Certificates\ CE1A3553BA6155DA5160097B4B1EA1FF4CBA7195 HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\sptd\Cfg HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services
This Trojan may be dropped by other malware. This is the Trend Micro detection for files that exhibit certain behaviors. Arrival Details This Trojan may be dropped by other malware. Information Theft
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan connects to the certain URL(s) to download its component file(s). Installation This Trojan injects threads into the following normal process(es): Explorer.exe Autostart Technique This
This Trojan connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts
Once users access any of the monitored sites, it starts logging keystrokes. It attempts to steal information, such as user names and passwords, used when logging into certain banking or