Keyword: pe_kaze.4236
2229 Total Search   |   Showing Results : 61 - 80
Arrival Details This malware arrives via the following means: Infected by PE_BUZUS.A-O Installation This file infector drops and executes the following files: %System%\{random filename}.exe -
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is Trend Micro detection for files which are infected and corrupted due to error(s) in malware coding in the infection routine of PE_MUSTAN.A Arrival Details This malware arrives via the
This is the Trend Micro detection for files infected by: PE_RAMNIT.KC-O File Infection This is the Trend Micro detection for files infected by: PE_RAMNIT.KC-O NOTES: The files detected as
contain the following strings in their names: OTSP WC32 WCUN WINC It avoids infecting the following files: .DLL files PE Files with "_win" section name Files with infection marker HOSTS File Modification
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This is a file infected by PE_FUJACKS.RC-O and PE_FUJACKS.DC-O. This file infector does not have any propagation routine. It does not have any backdoor routine. It does not have any downloading
This is the Trend Micro detection for files that were incorrectly infected by PE_SALITY variants. Files detected as PE_SALITY.DAM have damaged infection caused by the malware file itself. This damage
executed, this virus stores its codes in the Ring 0 Windows memory area to load itself in memory. It alters the PE file header so that the virus codes are accessed every time an infected file is executed. If
This file infector may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This file infector may be dropped by other malware.
The infected files are detected as PE_FUJACKS.RC. It deletes a file. It drops files in folders as an infection marker. It creates registry entries to disable execution of programs related to
This file infector modifies the Internet Explorer Zone Settings. It connects to certain websites to send and receive information. Arrival Details This malware arrives via the following means: as a
This file infector executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. File Infection This is the Trend Micro detection for files
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses Windows Task Scheduler to create a scheduled
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled
This file infector may be dropped by other malware. It creates an infection marker in infected files. Arrival Details This file infector may be dropped by other malware. This malware arrives via the
following files: .DLL files PE Files with _win section name Files with infection marker Backdoor Routine This file infector connects to any of the following IRC server(s): ru.{BLOCKED}s.pl core.{BLOCKED