Keyword: vbs_anna_kournikova_a
99707 Total Search   |   Showing Results : 961 - 980
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. As of this writing, the said sites are inaccessible. Arrival Details This Trojan may be unknowingly downloaded
of executing the dropped copy of a malware detected as TSPY_GOLROTED.AUSSKN, using these commands/codes: {Shell Object Name/Variable}.ShellExecute "%User Temp%\subfolder\filename.exe", "", "", "", 1
This Trojan may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the
recv send site-send sleep uninstall update It searches for anti-malware products installed in the system and reports the information to a remote site. It searches for removable drives connected to the
network shares and drop a copy of the said worm as N73.Image12.03.2009.JPG.scr Drops copy of the said worm in drives C to H in the following folders: New folder, music, print Drops files
is successful, it deletes the dropped file then sends delete as the server response upon success As a result, the hacker gets the domain and user name of the victim (web server) and determine if (s)he
{random characters}.exe → used for file handle manipulation {Malware Path}\{random characters}.bat → contains commands to take ownership of a file (Note: %Application Data% is the current user's Application
unlock.exe lock.rar ttos.exe NOTES: It executes the following files: lock.rar ttos.exe unlock.exe As a result, malicious routines of the files are exhibited on the affected system.
Description Name: CVE-2014-6332 - OLE Array Remote Code Execution HTTP Exploit . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This