Keyword: pe_kriz.4029
2207 Total Search   |   Showing Results : 1 - 20
   Next  
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Installation This Trojan drops the following files: %Start Menu%\Programs\Startup\ntuser_mssec.exe %UserTemp%\ope2C.exe %UserTemp%\16.tmp %UserTemp%\svchosty.exe %UserTemp%\ope2C.tmp %UserTemp%
CVE-2008-4029 Cross-domain vulnerability in Microsoft XML Core Services 3.0 and 4.0, as used in Internet Explorer, allows remote attackers to obtain sensitive information from another domain via a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/1352011121048.jpeg PE_SALITY and PE_VIRUX are two of the most prevalent file infector families to date. Trend Micro engineers observed an increase in
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/27102010104449.jpeg In October, TrendLabs SM reported on PE_LICAT.A-O , a new malware that inserts its code into .EXE files, turning them into the
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/317201351045.jpeg PE_EXPIRO is a family of file infector malware first detected in 2010. In July 11, 2013, we detected a notable rise in PE_EXPIRO
contain the following strings in their names: OTSP WC32 WCUN WINC It avoids infecting the following files: .DLL files PE Files with "_win" section name Files with infection marker HOSTS File Modification
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager,
This description is based on the compiled analysis of several variants of WORM_VBNA. Note that specific data such as file names and registry values may vary for each variant. This worm arrives by
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It
RUSTOCK malware are mostly backdoors, Trojans, and rootkits that have been downloaded by other malware such as BREDOLAB and VIRUX . This arrival routine was observed in website compromises seen in