Search
Keyword: pe_luder.ch-o
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This backdoor may be dropped by other malware.It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.It retrieves specific information from the affect...
This file infector may be dropped by other malware. However, as of this writing, the said sites are inaccessible.It deletes certain file types, disabling programs and applications from properly running.It infects by appending its code to target host...
This is a file infected by PE_FUJACKS.RC-O and PE_FUJACKS.DC-O.This file infector does not have any propagation routine.It does not have any backdoor routine.It does not have any downloading capability.It does not have any information-stealing capab...
This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.
This Virus prepends its codes to target files. It adds infection markers to files.It executes commands from a remote malicious user, effectively compromising the affected system.It encrypts files with specific file extensions. It encrypts files fou...
The most notorious file infectors of 2012—SALITY, XPAJ, MUSTAN, and QUERVAR—have different routines that make removal and containment a challenge. While their main routine—infecting files is by and large the main reason wh...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This file infector infects by inserting its code to unused space in host files.
Windows 98, ME, NT, 2000, XP, Server 2003
InstallationThis adware adds the following folders: C:\Documents and Settings\All Users\Application Data\DoraibuhogoC:\Documents and Settings\All Users\Application Data\SalesMonC:\Documents a...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
From: news@bbc.co.uk Subject: Vídeo Inédito Tremor no Haiti Terremoto Atinge o HaitiTremor de magnitude 7 derrubou casas, hospitais e igrejas.Um cinegrafista amador estava no local e flagrou imagens do exato ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It automatically executes files when a user opens a drive.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, as of this writing, the said sites are inaccessible.
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.