Keyword: VBS_DELF
4732 Total Search   |   Showing Results : 1481 - 1500
Installation This Trojan drops the following files: C:\windows\ie7_maim.log
This Backdoor adds registry entries to enable its automatic execution at every system startup. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It
This Trojan adds registry entries to enable its automatic execution at every system startup. Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at
This Backdoor connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts
Other System Modifications This Trojan adds the following registry keys: Other Details This Trojan adds the following lines or registry entries as part of its routine:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This backdoor arrives as a component bundled with malware/grayware packages. It opens a hidden Internet Explorer window. Arrival Details This backdoor arrives as a component bundled with
This backdoor may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It contains errors in its code. This stops it from performing its
However, as of this writing, the said sites are inaccessible. It deletes itself after execution. Arrival Details However, as of this writing, the said sites are inaccessible. Installation This Trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan may be dropped by other malware. It does not have any propagation routine. It does not have any backdoor routine. It does not drop any other file. It does not have any downloading