Keyword: pe_luder.ch-o
300 Total Search   |   Showing Results : 61 - 80
From: alan.lady@terra.com.br, Jessica Luiza.Subject: Gostaria qui fosse em minha formatura!!...(16:35:15), Cuidado com quem voce esta andando.CONVITE Oi, tudo bem!Estou te mandando o convite, todos osdetalhes...
Windows 2000, Windows XP, Windows Server 2003 File InfectionThis is the Trend Micro detection for files infected by: PE_GWAPOMI.A-O Step 1For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disabl...
Windows 2000, XP, Server 2003 Other DetailsBased on analysis of the codes, it has the following capabilities: This is Trend Micro detection for HTML files infected with PE_JADTRE.A-O. Step 1For Windows XP and Windows Server 2003 users,...
This file infector arrives via removable drives. It may be dropped by other malware.It prepends its codes to target files.It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected syste...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It does not have any i...
In our reseach, we stumbled upon a huge volume of spam posing as a weight loss advert. The click here in the spam message's body leads to a malicious website http://{BLOCKED}-25.com/?u=mlf80k9&o=fp2kvz...
This file infector infects .EXE files. Trend Micro detects infected files as PE_JADTRE.Y. It also infects .HTM, .HTML, .ASP, and .ASPX files by inserting a JavaScript code to target files. Infected files are detected as HTML_JADTRE.Y. It avoids infec...
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops an AUTORUN.INF file to automatically...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies files, disabling programs and applications from properly running.It deletes itself after execut...
This Trojan may be manually installed by a user.It connects to certain websites to send and receive information.
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It does not have any backdoor routine.It does not have any i...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.It deletes the initially executed copy of itself.
This Trojan arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It exports functions used by oth...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This file infector arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It infects by appending its code to ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.