Keyword: virus.win32.neshta.c
104821 Total Search   |   Showing Results : 561 - 580
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
\Engine\6\Intel 32 %System Root%\DOCUME~1 %System Root%\DOCUME~1\Wilbert %User Profile%\LOCALS~1 (Note: %Program Files% is the default Program Files folder, usually C:\Program Files.. %System Root% is the
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
copies of itself in the following shared folders: SharedDocs\porno_movie.mpeg.exe ADMIN$\porno_movie.mpeg.exe C$\porno_movie.mpeg.exe D$\porno_movie.mpeg.exe E$\porno_movie.mpeg.exe It drops the following
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This worm arrives by connecting affected removable drives to a system. It arrives via peer-to-peer (P2P) shares. It arrives on a system as a file dropped by other malware or as a file downloaded
This worm arrives via peer-to-peer (P2P) shares. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
Trend Micro has received multiple infections similar to this threat from multiple, independent sources, including customer reports and internal sources. These indicate that this threat poses a high
This cracking application may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This cracking application may be
This worm drops copies of itself into all the removable drives connected to an affected system. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the
This file infector infects by appending its code to target host files. Installation This file infector drops the following files: %Windows%\gemini.exe - detected as PE_GEMI.A (Note: %Windows% is the
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
Win32.Tyhos.A (BitDefender); W32/Tyhos.A (Fortinet); Virus win32:legacyascii/Tyhos.A (Norman); Trojan.Malex.F2 (QuickHeal)
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself in removable drives. These
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a