Search
Keyword: VBS_DELF
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Cybercriminals take advantage of the popularity of the Zoom messaging app. This backdoor is found in a fake Zoom installer. This is probably hosted on malicious or suspicious sites. This Backdoor
It drops a copy if itself along with the AUTORUN.INF file in mapped drives. This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself in all removable drives. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm may be unknowingly downloaded by a user while visiting malicious websites. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an
This worm may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It modifies registry entries to hide files with System and Read-only attributes. It
This worm arrives via removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Arrival Details This worm
This malware is involved in the targeted attack incident that shut down a global French-language television network on April 2015. Users affected by this malware may find the security of their
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
VirusCleaner.vbe shell\open=Open shell\open\Command=wscript.exe VirusCleaner.vbe NOTES: This worm delete files in drives with the following extensions: vbs It also delete files with the following file names:
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm drops copies of itself in the Windows Common Startup folder to enable its automatic execution at every system startup. It drops copies of itself into all the removable drives connected to