Keyword: pe_kaze.2056.a
99394 Total Search   |   Showing Results : 81 - 100
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
the target file contains a PE section with the name .reloc , it overwrites the section with its codes and deletes relocation information in the PE header. Otherwise, it adds the section, Padania , to
This is a file infected by PE_FUJACKS.RC-O and PE_FUJACKS.DC-O. This file infector does not have any propagation routine. It does not have any backdoor routine. It does not have any downloading
This file infector may be dropped by other malware. It creates an infection marker in infected files. Arrival Details This file infector may be dropped by other malware. This malware arrives via the
This file infector modifies the Internet Explorer Zone Settings. It connects to certain websites to send and receive information. Arrival Details This malware arrives via the following means: as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This file infector executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. File Infection This is the Trend Micro detection for files
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This malware is responsible for high infection numbers in EMEA, NABU, and China. To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram shown below.
This malware is a new LICAT variant that uses a different key for its domain generation algorithm. To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat
This Virus arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It prepends its codes to target files. Arrival Details
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It appends its codes to target files. It exports
This file infector infects .EXE files. Trend Micro detects infected files as PE_JADTRE.Y. It also infects .HTM, .HTML, .ASP, and .ASPX files by inserting a JavaScript code to target files. Infected
This file infector steals system information. This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result,
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It prepends its codes to target files. Arrival
usually shared (documents, spreadsheets, executables) and it targets mapped and removal drives. To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram
This file infector opens a hidden instance of IEXPLORE.EXE and connects to remote sites to download and execute possible malicious file(s). Infected files are detected as follows: DLL and EXE files -
This file infector is part of a malware family that has affected users in Australia and several other countries on October 2012. Besides infecting files, it also infects the affected system's (MBR)