Keyword: VBS_DELF
4732 Total Search   |   Showing Results : 761 - 780
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
Installation It drops the following files: %System root%\\vbs1.vbs
system. The said .INF file contains the following strings: [autorun] shellexecute=wscript.exe /e: vbs winfile.jpg Other Details However, due to errors in its code, it fails to perform its intended routine.
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It opens random ports. It opens a hidden Internet Explorer
This Trojan accesses or redirects users to sites that contains sexually explicit imagery, i.e. adult pornography sites. This Trojan may be hosted on a website and run when a user accesses the said
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This file infector arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: It
This Trojan arrives as a component bundled with malware/grayware packages. It may arrive using one or multiple arrival methods. This is the Trend Micro detection for files that exhibit certain
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. Propagation The said .INF file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This mew malware is related to the release of the Njw0rm malware source code found in early January 2015. To get a one-glance comprehensive view of the behavior of this Hacking Tool, refer to the
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from
This Trojan may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded