Keyword: JS_PSYME
4709 Total Search   |   Showing Results : 3401 - 3420
JS_OBFUSC.BEB loads a JAR file from this URL and it passes parameters to it if the computer has a particular Java version installed. This malware is related to a spammed message that leverages the
JS_OBFUSC.BEB redirects users to this URL if their computers have a particular Adobe Reader version installed. This malware is related to a spammed message that leverages the news on the "Royal Baby."
JS_OBFUSC.BEB redirects browsers to this site. This malware is related to a spammed message that leverages the news on the royal baby, Prince George.
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Infection Points This spyware arrives as a file
This spyware may be unknowingly downloaded by a user while visiting malicious websites. When executed, it adds folders. It injects itself into certain processes as part of its memory residency
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This worm drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation
This malicious HTMl file uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it
This Trojan may arrive bundled with malware packages as a malware component. Arrival Details This Trojan may arrive bundled with malware packages as a malware component. Download Routine This Trojan
This Trojan may be downloaded from remote sites by other malware. Arrival Details This Trojan may be downloaded from the following remote site(s): http://web.kfc.ha.cn:6668/Down/my/124.exe It may be
This Trojan may be dropped by other malware. It opens a hidden Internet Explorer window. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may
Other Details This Trojan does the following: Takes advantage of a vulnerability in certain versions of Adobe Acrobat and Reader to execute an arbitrary code, thus, compromising system security.
This Trojan may be downloaded from remote sites by other malware. Arrival Details This Trojan may be downloaded from remote site(s) by the following malware: JS_IFRAME.AAA Download Routine This
This spyware may be unknowingly downloaded by a user while visiting malicious websites. When executed, it adds folders. It injects itself into certain processes as part of its memory residency
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This