Keyword: pe_kaze.4236
2230 Total Search   |   Showing Results : 121 - 140
This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website. It executes the dropped file(s). As a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result,
This Virus arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It prepends its codes to target files. Arrival Details
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/1911201265318.jpeg File infectors have recently seen a resurgence in the threat landscape. Prominent examples of file infectors are MUSTAN and
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector has received attention from independent media sources and/or other security firms, specifically in Europe. It infects .DOC, .DOCX, .XLS, .XLSX, and .EXE files. It targets mapped
This file infector may arrive as an infected file. This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
Trend Micro has received multiple samples of this malware from multiple, independent sources, including customer reports and internal sources. These indicate that this file infector poses a high risk
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It infects certain file types by inserting code
The XPAJ family of file infectosr has been known since 2009. Its main purpose is to redirect infected users to click fraud, generating profit for its makers. It has gained capability to spread via
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It inserts its codes into unused space in files.
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This file infector arrives via removable drives. It may be dropped by other malware. It prepends its codes to target files. It drops an AUTORUN.INF file to automatically execute the copies it drops
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It infects certain file types by inserting code
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates certain registry entries to disable
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a