Keyword: VBS_PSYME
3224 Total Search   |   Showing Results : 461 - 480
This Trojan arrives as a component bundled with malware/grayware packages. It may arrive using one or multiple arrival methods. This is the Trend Micro detection for files that exhibit certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan accesses or redirects users to sites that contains sexually explicit imagery, i.e. adult pornography sites. This Trojan may be hosted on a website and run when a user accesses the said
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This file infector arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It is a component of other malware. It automatically executes files when a user opens
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. Installation This Trojan drops the following non-malicious file: {malware path}\NVBCK.exe -
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: W97M_FAKEUPS.A NOTES: It executes the following file: %Temp%\adobeacd-update.ps1 -
This Trojan may be dropped by other malware. This is the Trend Micro detection for files that exhibit certain behaviors. Arrival Details This Trojan may be dropped by other malware. Other Details
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded