Keyword: virus.win32.neshta.c
105228 Total Search   |   Showing Results : 261 - 280
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is the Trend Micro detection for files patched and partially overwritten with malicious code of the ZACCESS (ZEROACCESS) malware family. For more information on the routines of the ZACCESS
Win32.Virtob.Gen.12 (Bitdefender), W32/LPECrypt.A!tr (Fortinet), W32/Virut.AL!Generic (Fprot), Trojan.Sality (Ikarus), Win32/Virut.NBP virus (NOD32), Trojan Sality.dam (Norman), W32/Sality.AK.drp (Panda),
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. Arrival Details This
10.0\Resource\TypeSupport\Unicode\Mappings\Mac\Desktop_2.ini %Program Files%\Adobe\Reader 10.0\Resource\Font\Desktop_1.ini %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win
NOTES: This is the Trend Micro detection for .SYS files that are modified by TDSS malware to aid its routines. The patched codes are responsible for executing the malware during startup and inject
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This is the Trend Micro detection for files patched with malicious code by ZEROACCESS malware family. It is then used as an autostart malware component. Once the normal file is loaded, it executes a
sites. It infects files by overwriting code in the entry point and saving the overwritten code in the virus body. It then appends the virus body to the host file. It connects to a website to send and
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\ MountPoints2\A BaseClass = "Drive" (Note: The default value data of the said registry entry is Drive .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ MountPoints2\C BaseClass = "Drive"
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a