Keyword: pe_nimda.a
99885 Total Search   |   Showing Results : 161 - 180
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It infects certain file types by inserting code
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. File Infection This is the Trend Micro detection for files
This file infector executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. File Infection This is the Trend Micro detection for files
has the following capabilities: It opens a hidden instance of iexplore.exe and connects to remote sites to download and execute possible malicious file(s). Injects a malicious VBScript to HTML files.
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
perpetrators. This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
network drives and USB/removable drives. To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram shown below. This file infector arrives on a system as a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various
Trend Micro has flagged this file infector as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, this is a new LICAT variant that uses a
This file infector connects to certain IRC server(s). This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It infects files by overwriting code in the entry
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It prepends its codes to target files. It adds
when a user accesses the drives of an affected system. It uses a list of passwords to gain access to password-protected shares. However, as of this writing, the said sites are inaccessible. Arrival
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It infects by appending its code to target host
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder