Keyword: VBS_PSYME
3216 Total Search   |   Showing Results : 2201 - 2220
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
ODS ODT OGG PDF PEK PIF REG RTF SDF SEK SYS TMP TTF TXT VBS WMA XLS XML It does the following: It executes the following command to delete shadow copies of itself: cmd.exe /c vssadmin.exe delete shadows
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Coinminer arrives as a component bundled with malware/grayware packages. It downloads a file from a certain URL then renames it before storing it in the affected system. It executes the
This Backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It adds certain registry entries to disable the Task
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. This is the Trend Micro detection for files that exhibit certain behaviors. Arrival Details This Trojan may be
osc my mark msi mci msn folder rgu bin cmd com inf ins inx isu job jse msp mst paf pif reg sct shb shs vbs vbscript vbe wsf It executes the following command to delete shadow copies: vssadmin delete
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
osc my mark msi mci msn folder rgu bin cmd com inf ins inx isu job jse msp mst paf pif reg sct shb shs vbs vbscript vbe wsf It executes the following command to delete shadow copies: vssadmin delete
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It adds certain registry entries to disable the Task
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
\ \public\videos\sample videos\ \tor browser\ It executes the dropped VBS component which is responsible for speaking the following message: "Attention! Attention! Attention! Your documents, photos, databases
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It encrypts files
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive