Keyword: pe_nimda.a
98557 Total Search   |   Showing Results : 41 - 60
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager,
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
connecting affected removable drives to a system. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It deletes registry entries, causing some
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses Windows Task Scheduler to create a
as US and UK. To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram shown below. This is the Trend Micro detection for files that exhibit certain
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It
countries such as US and UK. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. Arrival Details This malware arrives via the following means: MSI
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
2009 and 2010. RUSTOCK also came as attachment to spammed email. RUSTOCK acts as a proxy server on affected systems. It uses this routine to send spammed messages. The content of the spammed messages
2009 and 2010. RUSTOCK also came as attachment to spammed email. RUSTOCK acts as a proxy server on affected systems. It uses this routine to send spammed messages. The content of the spammed messages
2009 and 2010. RUSTOCK also came as attachment to spammed email. RUSTOCK acts as a proxy server on affected systems. It uses this routine to send spammed messages. The content of the spammed messages
2009 and 2010. RUSTOCK also came as attachment to spammed email. RUSTOCK acts as a proxy server on affected systems. It uses this routine to send spammed messages. The content of the spammed messages
2009 and 2010. RUSTOCK also came as attachment to spammed email. RUSTOCK acts as a proxy server on affected systems. It uses this routine to send spammed messages. The content of the spammed messages
2009 and 2010. RUSTOCK also came as attachment to spammed email. RUSTOCK acts as a proxy server on affected systems. It uses this routine to send spammed messages. The content of the spammed messages
2009 and 2010. RUSTOCK also came as attachment to spammed email. RUSTOCK acts as a proxy server on affected systems. It uses this routine to send spammed messages. The content of the spammed messages