Keyword: pe_kaze.4236
2230 Total Search   |   Showing Results : 141 - 160
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It prepends its codes to target files. It adds
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result,
File Infection This is the Trend Micro detection for files infected by: PE_GWAPOMI.A-O
This Trojan disables Task Manager, Registry Editor, and Folder Options. It drops copies of itself in all removable and physical drives found in the system. It drops an AUTORUN.INF file to
This file infector arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to
This destructive memory resident, polymorphic virus infects Win 32 (PE) executables in the Windows directory and its subdirectories. It infects these files upon boot-up, after the virus has been
This destructive memory resident, polymorphic virus infects Win 32 (PE) executables in the Windows directory and its subdirectories. It infects these files upon boot-up, after the virus has been
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It prepends its codes to target files. Arrival
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This file infector infects by appending its code to target host files. Installation This file infector adds the following mutexes to ensure that only one of its copies runs at any one time: Vx_4 File
This file infector is part of a malware family that has affected users in Australia and several other countries on October 2012. Besides infecting files, it also infects the affected system's (MBR)
characteristics: .DLL files PE Files with _win section name Files with infection marker It also infects script files by first checking if the target script file's extension name is any of the following: .ASP .HTM
Files with infection marker PE files with _win section name It returns execution to the host file's original code after execution. It may also connect to randomly generated domains for its C&C (command
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder