Keyword: vbs_anna_kournikova_a
99642 Total Search   |   Showing Results : 941 - 960
This Trojan may be dropped by other malware. It is a component of other malware. Arrival Details This Trojan may be dropped by the following malware: VBS_DUNIHI Installation This Trojan is a
Routine This Trojan connects to the following URL(s) to send and receive commands from a remote malicious user: http://{BLOCKED}s.0fees.net/count/{computer name}{MAC Address} Other Details However, as of
This Trojan may be dropped by other malware. It does not have any propagation routine. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to the following malware: VBS_DUNIHI If your Trend Micro product detects a file under this
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
downloader %User Profile%\Downloads\update.vbs ← executes awareness.doc %User Startup%\start.vbs ← executes VBS file (Note: %User Profile% is the current user's profile folder, which is usually C:
XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.) NOTES: This malware arrives as a .LNK file as brief-introductions.txt.lnk which targets %System%\mshta.exe
XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.) NOTES: It arrives as a .LNK file as brief-introductions.txt.lnk which targets %System%\mshta.exe: http://www.
copy of autoit.exe NOTES: This malware will check if the dropped file {malware path}:\NVBCK.exe is currently running in the system. If so, it will sleep for a second until the file is not currently
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: W97M_FAKEUPS.A NOTES: It executes the following file: %Temp%\adobeacd-update.ps1 -
This is the Trend Micro detection for: This is a detection for shortcut files dropped by DUNIHI worms. This .LNK files point to the copy of DUNIHI worms in removable drives. These dropped .LNK files use
as an attachment to email messages spammed by other malware/grayware or malicious users. Download Routine This Trojan connects to the following website(s) to download and execute a malicious file:
This Trojan may arrive bundled with malware packages as a malware component. Arrival Details This Trojan may arrive bundled with malware packages as a malware component. Dropping Routine This Trojan
VKHOST variants are downloader malware that modify the affected system's HOSTS files to prevent a user from accessing certain websites. Installation This worm drops the following non-malicious files:
This Trojan may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This Trojan
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. Installation This Trojan drops
malware/grayware or malicious users. NOTES: Once the malicious document is opened, this malware executes a macro to drop the following files: Windows version 5.5 or below: %Temp%\AdOBEACD-UPDATEXP.VBS %Temp%
malware/grayware or malicious users. NOTES: Once the malicious document is opened, it executes a macro to drop the following files: Windows Version 5.5 or below: %Temp%\adobeacd-updatexp.vbs %Temp%
WIMMIE is a family of Trojans that have the capability to drop and execute malicious VBS files. These VBS files can perform different commands of remote malicious users. Upon execution, WIMMIE