Keyword: vbs_anna_kournikova_a
99708 Total Search   |   Showing Results : 1381 - 1400
This Trojan arrives as attachment to mass-mailed email messages. As of this writing, the said sites are inaccessible. This is the Trend Micro detection for files that contain a malicious script.
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Installation This Trojan drops the following files: %User Temp%
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Other Details This Trojan
{BLOCKED}s.{BLOCKED}lformats.org/drawingml/2006/main NOTES: Document file embedded with VBS script that when user activates, it may exhibit possibly malicious activities. Trojan-Downloader.MSWord.Agent.aib
a specific parameter in order to perform its intended routine: "{Malware Path}\{Malware Filename}.dll",EnhancedStoragePasswordConfig 147 It prevents encrypting files containing any of the strings in
Arrival Details This Trojan may be downloaded from the following remote site(s): http://pwned.{BLOCKED}4.com/2016.html Other Details More information on this vulnerability can be found below:
This Ransomware drops files as ransom note. Installation This Ransomware drops the following files: %User Temp%\E_N60005\krnln.fnr = module to be loaded %User Temp%\abc.txt = not used %Application
writing, the said sites are inaccessible. Other Details This Trojan does the following: Issues the following command to download and execute a possibly malicious Visual Basic (VB) script: {BLOCKED}GLNK.com
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_PIDIEF.OB Installation This Trojan drops and executes the following files: %Temp
website(s) to download and execute a malicious file: http://{BLOCKED}.{BLOCKED}.236.120:8080/421.exe It saves the files it downloads using the following names: 2008.exe
Propagation The said .INF file contains the following strings: [autorun] shellexecute=Wscript.exe /e:vbs winfile.jpg Other Details This Trojan does the following: This is Trend Micro detection for
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: W97M_FAKEUPS.A NOTES: It executes the following file: %Temp%\adobeacd-update.vbs -
This Trojan may be dropped by other malware. It is used to load and execute a file. Arrival Details This Trojan may be dropped by the following malware: W97M_DLOADER.AI Other Details This Trojan
execute malicious files If your Trend Micro product detects a file under this detection name, do not execute the file.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
Micro product detects a file under this detection name, do not execute the file.
This Trojan employs registry shell spawning by adding certain registry entries. This allows this malware to execute even when other applications are opened. It modifies Internet Explorer security
This worm arrives via removable drives. It drops copies of itself in all removable and physical drives found in the system. Arrival Details This worm arrives via removable drives. Installation This
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other