Keyword: VBS_DELF
4732 Total Search   |   Showing Results : 1721 - 1740
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This file infector opens a hidden instance of iexplore.exe and connects to remote sites to download and execute possible malicious file(s). It is capable of injecting a malicious VBScript to HTML
It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. This is the Trend Micro detection for files that exhibit certain
Propagation The said .INF file contains the following strings: [autorun] shellexecute=Wscript.exe /e:vbs winfile.jpg Other Details This Trojan does the following: This is Trend Micro detection for
Trend Micro has flagged this Trojan as noteworthy due to the multiple samples of this malware received from multiple, independent sources, including customer reports and internal sources. This
This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website. It executes the dropped file(s). As a
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_PIDIEF.JSJ Installation This Trojan drops and executes the following files:
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. Arrival Details This Trojan may be downloaded by other malware/grayware/spyware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Installation This Trojan drops the following files: %User Temp%
This Trojan may be hosted on a website and run when a user accesses the said website. It creates registry entries to enable its automatic execution at every system startup. Arrival Details This
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This trojan creates a VBS script, %User Temp%\down.vbs, to connect to a certain web site
This Trojan may be dropped by other malware. It automatically executes files when a user opens a drive. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This