Keyword: VBS_PSYME
3222 Total Search   |   Showing Results : 3141 - 3160
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
the following file(s) as ransom note: {Encrypted directory}\README_TO_DECRYPT.html It avoids encrypting files with the following file extensions: exe dll sys msi mui inf cat bat cmd ps1 vbs ttf fon lnk
This Virus arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It enables its automatic execution at every system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
.quantum It drops the following file(s) as ransom note: {Encrypted directory}\README_TO_DECRYPT.html It avoids encrypting files with the following file extensions: exe dll sys msi mui inf cat bat cmd ps1 vbs
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
\README_TO_DECRYPT.html It avoids encrypting files with the following file extensions: exe dll sys msi mui inf cat bat cmd ps1 vbs ttf fon lnk Trojan.Win64.Agentb.aum (KASPERSKY), Trojan:Win64/MountLocker!MTB (MICROSOFT)
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders. It
delete itself from the infected system via the following command: powershell Remove-Item -Path {File Path} -Force ins - enables persistence by dropping a copy of itself and creating a VBS script that
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive