Keyword: virus.win32.neshta.c
104821 Total Search   |   Showing Results : 561 - 580
\Engine\6\Intel 32 %System Root%\DOCUME~1 %System Root%\DOCUME~1\Wilbert %User Profile%\LOCALS~1 (Note: %Program Files% is the default Program Files folder, usually C:\Program Files.. %System Root% is the
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This is the Trend Micro detection for files patched and partially overwritten with malicious code of the ZACCESS (ZEROACCESS) malware family. For more information on the routines of the ZACCESS
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
copies of itself in the following shared folders: SharedDocs\porno_movie.mpeg.exe ADMIN$\porno_movie.mpeg.exe C$\porno_movie.mpeg.exe D$\porno_movie.mpeg.exe E$\porno_movie.mpeg.exe It drops the following
This worm arrives via peer-to-peer (P2P) shares. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives by connecting affected removable drives to a system. It arrives via peer-to-peer (P2P) shares. It arrives on a system as a file dropped by other malware or as a file downloaded
Trend Micro has received multiple infections similar to this threat from multiple, independent sources, including customer reports and internal sources. These indicate that this threat poses a high
This file infector infects by appending its code to target host files. Installation This file infector drops the following files: %Windows%\gemini.exe - detected as PE_GEMI.A (Note: %Windows% is the
This cracking application may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This cracking application may be
This worm drops copies of itself into all the removable drives connected to an affected system. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
Win32.Tyhos.A (BitDefender); W32/Tyhos.A (Fortinet); Virus win32:legacyascii/Tyhos.A (Norman); Trojan.Malex.F2 (QuickHeal)
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself in removable drives. These
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder