Keyword: VBS_PSYME
3222 Total Search   |   Showing Results : 2861 - 2880
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
raw result rll rm rpf rtf rw2 rwl sql sqlite sqllite sr2 srf srt srw svg swf tga tiff toast ts txt vbs vcd vlc vmdk vmx vob wav wb2 wdb wma wmv wpd wps x3f xlk xls xlsb xlsm xlsx xml xps xsl yml yuv zip
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
potx ppam pps ppsm ppsx PPT pptm pptx psd qcow2 rar raw RTF sch sldm sldx slk sql SQLITE3 SQLITEDB stc std sti stw svg swf sxc sxd sxi sxm sxw tar tar tbk tgz tif tiff uop uot vbs vdi vmdk vmx vob wav
This spyware modifies the Internet Explorer Zone Settings. Arrival Details This malware arrives via the following means: Through an email attachment containing a download link which connects to
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
trp ts tu tur txd txf txt uax udf uea umx unity3d unr unx uop uot upk upoi url usa usx ut2 ut3 utc utx uu uud uue uvx uxx val vault vb vbox vbs vc vcd vcf vcxpro vdf vdi vdo ver vfs0 vhd vhdx vlc vlt
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
However, as of this writing, the said sites are inaccessible. Installation This Trojan drops the following files: {folder of encrypted files}\_HELP_Recover_Files_.html - ransom note %User Profile%
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This Trojan may be downloaded by other malware/grayware from remote sites. It connects to certain websites to send and receive information. It deletes the initially executed copy of itself. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It connects
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This