Keyword: VBS_DELF
4739 Total Search   |   Showing Results : 2701 - 2720
LEGMIR is a family of information stealers. Its primary routine is to steal user names and passwords used in online games. In 2007, some website compromises were found to have distributed LEGMIR
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
LEGMIR is a family of information stealers. Its primary routine is to steal user names and passwords used in online games. In 2007, some website compromises were found to have distributed LEGMIR
LEGMIR is a family of information stealers. Its primary routine is to steal user names and passwords used in online games. In 2007, some website compromises were found to have distributed LEGMIR
LEGMIR is a family of information stealers. Its primary routine is to steal user names and passwords used in online games. In 2007, some website compromises were found to have distributed LEGMIR
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
LEGMIR is a family of information stealers. Its primary routine is to steal user names and passwords used in online games. In 2007, some website compromises were found to have distributed LEGMIR
This backdoor may be dropped by other malware. It deletes itself after execution. Arrival Details This backdoor may be dropped by the following malware: TROJ_ADOBFP.SM Installation This backdoor
This Trojan arrives as a file that exports the functions of other malware/grayware. It may be dropped by other malware. Arrival Details This Trojan arrives as a file that exports the functions of
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a