Search
Keyword: dropper bridge77222222222222222222222222222222222222222222222222
46 Total Search |
Showing Results : 1 - 20
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites.
This destructive memory resident, polymorphic virus infects Win 32 (PE) executables in the Windows directory and its subdirectories.It infects these files upon boot-up, after the virus has been executed. In some instances, the virus corrupts the file...
This destructive memory resident, polymorphic virus infects Win 32 (PE) executables in the Windows directory and its subdirectories. It infects these files upon boot-up, after the virus has been executed. In some instances, the virus corrupts the fil...
This Trojan writes a malicious Windows Management Instrumentation (WMI) JScript that connects to a remote site to possibly download other malicious file(s) and execute arbitrary commands upon execution. Creating a WMI script effectively hides the mal...
This Trojan writes a malicious Windows Management Instrumentation (WMI) JScript that connects to a remote site to possibly download other malicious file(s) and execute arbitrary commands upon execution. Creating a WMI script effectively hides the mal...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Upon execution, VBS_WIMMIE.SMC writes a malicious Windows Management Instrumentation (WMI) JScript that connects to a remote site to possibly download other malicious file(s) and execute arbitrary commands. Creating a WMI script effectively hides the...
FESTI malware comes from a bot network also known as Spamnost. Its first appearance is in 2009. This malware uses a dropper to install itself in the system. After installation, it uses its rootkit functionality to perform malicious routines. One of t...
This Trojan may be downloaded by other malware/grayware from remote sites.
This is the Trend Micro Virtual Analyzer detection for possibly malicious files. It is a heuristic detection based on well-established characteristics inherent to malware that drop additional files or malware. To keep customers a step ahead from poss...
This backdoor deletes its dropper component after the DLL is installed as service.Its service name is randomly selected, based on the result of a certain registry query.Before continuing to execute, it checks a certain signature/configuration at the ...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware.
Upon execution, this malware writes a malicious Windows Management Instrumentation (WMI) JScript that connects to a remote site to possibly download other malicious file(s) and execute arbitrary commands. Creating a WMI script effectively hides the m...
This malware is the dropper for the malware BKDR_NELOWEG.DD, a backdoor whose primary purpose is stealing information from online transactions, which is capable of running on Windows Vista and Windows 7.To get a one-glance comprehensive view of the b...
This Trojan may be dropped by other malware.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note. It avoids encrypting files with the following file extensions.
This spyware may be dropped by other malware.It steals sensitive information such as user names and passwords related to certain games.