Keyword: VBS_SMALL
4601 Total Search   |   Showing Results : 1621 - 1640
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_PIDIEF.OB Installation This Trojan drops and executes the following files: %Temp
However, as of this writing, the said sites are inaccessible. Arrival Details However, as of this writing, the said sites are inaccessible. Download Routine This Trojan connects to the following
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_VBCLIK.SMI Other Details This Trojan does the following: It starts the malware
This Trojan may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded
This hacking tool is a free program from 3proxy . It is an HTTP/HTTPS proxy with FTP over HTTP support. It is used by other malware, specifically by VBS_PENEPE.C , in performing its backdoor
Propagation The said .INF file contains the following strings: [autorun] shellexecute=Wscript.exe /e:vbs winfile.jpg Other Details This Trojan does the following: This is Trend Micro detection for
This specially crafted PDF file drops and execute a malicious file, game.exe. The dropped file is detected by Trend Micro as WORM_EMOTI.A. This Trojan arrives as an attachment to email messages
This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website. It executes the dropped file(s). As a
This Trojan may be hosted on a website and run when a user accesses the said website. It creates registry entries to enable its automatic execution at every system startup. Arrival Details This
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Installation This Trojan drops the following files: %User Temp%
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_PIDIEF.JSJ Installation This Trojan drops and executes the following files:
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. Arrival Details This Trojan may be downloaded by other malware/grayware/spyware
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This trojan creates a VBS script, %User Temp%\down.vbs, to connect to a certain web site
This Trojan may be dropped by other malware. It automatically executes files when a user opens a drive. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from the Internet and installed by unsuspecting users. Trojans
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This