Keyword: PE_LUDER.A
97813 Total Search   |   Showing Results : 21 - 40
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
the number of PE_SALITY- and PE_VIRUX-infected systems in the Asia/Pacific region. In March 2010, they also observed a spike in the PE_SALITY and PE_VIRUX infection count in Latin America. File
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/27102010104449.jpeg In October, TrendLabs SM reported on PE_LICAT.A-O , a new malware that inserts its code into .EXE files, turning them into the
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/317201351045.jpeg PE_EXPIRO is a family of file infector malware first detected in 2010. In July 11, 2013, we detected a notable rise in PE_EXPIRO
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
Trend Micro has received multiple infections similar to this threat from multiple, independent sources, including customer reports and internal sources. These indicate that this threat poses a high
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager,
connecting affected removable drives to a system. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It deletes registry entries, causing some
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses Windows Task Scheduler to create a
as US and UK. To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram shown below. This is the Trend Micro detection for files that exhibit certain
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It
countries such as US and UK. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. Arrival Details This malware arrives via the following means: MSI
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder