Keyword: vbs_anna_kournikova_a
99642 Total Search   |   Showing Results : 921 - 940
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does
This Trojan arrives as a file that exports the functions of other malware/grayware. It may be dropped by other malware. Arrival Details This Trojan arrives as a file that exports the functions of
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may arrive bundled with malware packages as a malware component. It does not have any
malware/grayware or malicious users. NOTES: Once the malicious document is opened, it executes a macro to drop the following files: Windows Version 5.5 or below: %Temp%\adobeacd-update.vbs %Temp%\adobeacd-update.bat
This worm arrives via removable drives. It arrives by accessing affected shared networks. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of
This Trojan may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: Once executed, this Trojan searches for the file C:\TEMP\pAjsg.b64 , extracts a file,
This malicious VBScript is used for downloading a remote file and saving it to the local drive. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This worm arrives via removable drives. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This worm arrives via