Keyword: virus.win32.neshta.c
104834 Total Search   |   Showing Results : 1001 - 1020
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
virus John Doe It checks if the following virtual machine- or sandbox-related registry keys are present in the affected system: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\ DSDT\VBOX__ HKEY_LOCAL_MACHINE\HARDWARE
\TypeSupport\Unicode\Mappings\Mac\UKRAINE.TXT %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\CP1250.TXT %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\Desktop_2.ini %User Temp%\myUPdatetxt.txt %Program Files%\Adobe\Reader 10.0\Resource\Linguistics\Desktop_1.ini %Program Files%\Adobe\Reader 10.0\Setup
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
f-secure computerassociates networkassociates etrust panda sophos trendmicro mcafee norton symantec microsoft defender rootkit malware spyware virus It uses the following set of credentials to brute force
\Resource\TypeSupport\Unicode\Mappings\Mac\tmp_UKRAINE.TXT %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\tmp_CP1250.TXT %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport
This Trojan connects to a website to send and receive information. It displays fake alerts that warn users of infection. It also displays fake scanning results of the affected system. It then asks
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This