Keyword: downad
68 Total Search   |   Showing Results : 61 - 68
LICAT are file infectors that exhibit ZEUS behaviors. Seen during the last quarter of 2010, these file infectors spread by infecting .EXE files. Some recent variants were seen to be distributed via
This worm arrives via removable drives. It may be dropped by other malware. Arrival Details This worm arrives via removable drives. It may arrive via network shares. It may be dropped by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm arrives via removable drives. It may be dropped by other malware. Arrival Details This worm arrives via removable drives. It may arrive via network shares. It may be dropped by other
This Trojan requires its main component to successfully perform its intended routine. Other Details This Trojan requires its main component to successfully perform its intended routine. It adds the
This Trojan requires its main component to successfully perform its intended routine. Other Details This Trojan requires its main component to successfully perform its intended routine. It adds the
Description Name: Override detection . This is the Trend Micro detection for malicious N/A network packet
Description Name: CONFICKER - HTTP (Request) .