Keyword: vbs_anna_kournikova_a
99708 Total Search   |   Showing Results : 1361 - 1380
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This Trojan may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded
This Trojan may be dropped by other malware. It automatically executes files when a user opens a drive. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan
This Worm arrives via removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It executes the downloaded
RAMNIT is a multi-component malware that infects .DLL, .EXE, and HTML files. This malware family is known to propagate via removable drives. RAMNIT steals sensitive information such as saved FTP
This Trojan may arrive bundled with malware packages as a malware component. Arrival Details This Trojan may arrive bundled with malware packages as a malware component. Dropping Routine This Trojan
EMOTI is a malware family used to install a rootkit. It also propagates to all removable drives on a user's system. It is downloaded via the Internet. Its notable routines include code injection to
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
Backdoor Routine This Trojan does not have any backdoor routine. Download Routine This Trojan connects to the following website(s) to download and execute a malicious file: http://utsi.{BLOCKED}e.fr/4/4.exe
(32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.) Download Routine This Trojan connects to the following website(s) to download and execute a malicious file:
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan may be dropped by other malware. It is a component of other malware. Arrival Details This Trojan may be dropped by the following malware: VBS_DUNIHI Installation This Trojan is a
malware/grayware or malicious users. Installation This Trojan drops the following component file(s): %Application Data%\{random number}.vbs - component responsible for accessing a URL to download a file (Note:
malware/grayware or malicious users. Installation This Trojan drops the following component file(s): %Application Data%\{random number}.vbs - component responsible for accessing a URL to download a file (Note:
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
the other one is passing itself off as a 'Document invoice_[Random number]_sign_and_return.pdf is complete' notification. Int his particular context, 'malformed' means that something went wrong in the
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Other Details This Trojan
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Installation This Trojan drops the following files: %User Temp%
This Trojan may be downloaded from remote sites by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival
This Trojan arrives as a component bundled with malware/grayware packages. It may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival