Keyword: pe_nimda.a
99373 Total Search   |   Showing Results : 81 - 100
This file infector modifies the Internet Explorer Zone Settings. It connects to certain websites to send and receive information. Arrival Details This malware arrives via the following means: as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This file infector executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. File Infection This is the Trend Micro detection for files
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This malware is responsible for high infection numbers in EMEA, NABU, and China. To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram shown below.
This malware is a new LICAT variant that uses a different key for its domain generation algorithm. To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat
This Virus arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It prepends its codes to target files. Arrival Details
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It appends its codes to target files. It exports
This file infector infects .EXE files. Trend Micro detects infected files as PE_JADTRE.Y. It also infects .HTM, .HTML, .ASP, and .ASPX files by inserting a JavaScript code to target files. Infected
This file infector steals system information. This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result,
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It prepends its codes to target files. Arrival
usually shared (documents, spreadsheets, executables) and it targets mapped and removal drives. To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram
This file infector opens a hidden instance of IEXPLORE.EXE and connects to remote sites to download and execute possible malicious file(s). Infected files are detected as follows: DLL and EXE files -
This file infector is part of a malware family that has affected users in Australia and several other countries on October 2012. Besides infecting files, it also infects the affected system's (MBR)
containment a challenge. While their main routine—infecting files is by and large the main reason why they so easily spread—they also spread via various means that allow them to infect thousands of machines.
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies
This file infector arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the