Keyword: pe_nimda.a
99223 Total Search   |   Showing Results : 61 - 80
2009 and 2010. RUSTOCK also came as attachment to spammed email. RUSTOCK acts as a proxy server on affected systems. It uses this routine to send spammed messages. The content of the spammed messages
2009 and 2010. RUSTOCK also came as attachment to spammed email. RUSTOCK acts as a proxy server on affected systems. It uses this routine to send spammed messages. The content of the spammed messages
2009 and 2010. RUSTOCK also came as attachment to spammed email. RUSTOCK acts as a proxy server on affected systems. It uses this routine to send spammed messages. The content of the spammed messages
2009 and 2010. RUSTOCK also came as attachment to spammed email. RUSTOCK acts as a proxy server on affected systems. It uses this routine to send spammed messages. The content of the spammed messages
2009 and 2010. RUSTOCK also came as attachment to spammed email. RUSTOCK acts as a proxy server on affected systems. It uses this routine to send spammed messages. The content of the spammed messages
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Arrival Details This malware arrives via the following means: Infected by PE_BUZUS.A-O Installation This file infector drops and executes the following files: %System%\{random filename}.exe -
This file infector may arrive using one or multiple arrival methods. Arrival Details This file infector arrives via the following means: Infected by PE_COSVAR.A-O Installation This file infector
Trend Micro has received multiple samples of this malware from several, independent sources, including customer reports and internal sources. These indicate that this worm poses a high risk to users
This is Trend Micro detection for files which are infected and corrupted due to error(s) in malware coding in the infection routine of PE_MUSTAN.A Arrival Details This malware arrives via the
This file infector may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This file infector may be dropped by other malware.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses Windows Task Scheduler to create a scheduled
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It adds
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It prevents users from visiting antivirus-related
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
the target file contains a PE section with the name .reloc , it overwrites the section with its codes and deletes relocation information in the PE header. Otherwise, it adds the section, Padania , to
This is a file infected by PE_FUJACKS.RC-O and PE_FUJACKS.DC-O. This file infector does not have any propagation routine. It does not have any backdoor routine. It does not have any downloading
This file infector may be dropped by other malware. It creates an infection marker in infected files. Arrival Details This file infector may be dropped by other malware. This malware arrives via the