Keyword: pe_kaze.4236
2230 Total Search   |   Showing Results : 261 - 280
This file infector infects by overwriting certain sections of target files with its code. It infects by inserting its code to unused space in host files. It infects by appending its code to target
This file infector infects certain file types by inserting code in the said files. Arrival Details This malware arrives via the following means: may arrive in the system when infected files are
This file infector drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This file infector drops the following
Arrival Details This malware arrives via the following means: modified by other malware NOTES: This is Trend Micro's detection for a legitimate SYS file that has been modified by another malware to
This is a type of metamorphic virus that infects Win32 files. This virus disassembles the host file and integrates itself between the target file's codes. This virus then rebuilds the codes that
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This file infector may arrive as an infected file. This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This file infector arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically
This is the Trend Micro detection for patched .DLL files that have been modified by another malware to automatically load the other malware when the file infected with this malware is loaded. NOTES:
This file infector arrives via removable drives. It may be unknowingly downloaded by a user while visiting malicious websites. It infects by appending its code to target host files. It drops copies
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival
This file infector infects by appending its code to target host files. Installation This file infector drops the following copies of itself into the affected system: %Windows%\Logo1_.exe (Note:
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to hide files with
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This is the Trend Micro detection for files that exhibit certain behaviors. Arrival Details This malware arrives via the following means: Modified by other malware Other Details This is the Trend
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector drops copies of itself in removable drives. These dropped copies use the names of the folders located on the said drives for their file names. Installation This file infector drops