Keyword: virus.win32.neshta.c
104971 Total Search   |   Showing Results : 1921 - 1940
\_desktop.ini %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\
Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0
\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\{AC76BA86-7AD7-1033-7B44-AA0000000001}\_desktop.ini %Program Files%
\_desktop.ini %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\
Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0
\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\{AC76BA86-7AD7-1033-7B44-AA0000000001}\_desktop.ini %Program Files%
Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0
\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\{AC76BA86-7AD7-1033-7B44-AA0000000001}\_desktop.ini %Program Files%
\Unicode\Mappings\win\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\_desktop.ini %Program Files%\Adobe\Reader 10.0\Setup Files\{AC76BA86-7AD7-1033-7B44-AA0000000001}\_desktop.ini %Program Files%
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This potentially unwanted application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious