Keyword: virus.win32.neshta.c
104835 Total Search   |   Showing Results : 1301 - 1320
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\Microsoft\ Windows\CurrentVersion\Uninstall\ Win shopping icon guide It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\IlikeClick ICMA = "{random characters}" HKEY_LOCAL_MACHINE\SOFTWARE
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This AutoIt-compiled malware downloads a coinminer in affected systems. This malware is distributed by cybercriminals by bundling it with a legitimate installer of the Zoom communication app. This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0
\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\{AC76BA86-7AD7-1033-7B44-AA0000000001}\_desktop.ini %Program Files%
Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0
\_desktop.ini %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\
\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\{AC76BA86-7AD7-1033-7B44-AA0000000001}\_desktop.ini %Program Files%
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a