Keyword: VBS_PSYME
3214 Total Search   |   Showing Results : 1041 - 1060
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Installation This Trojan drops the following files: %User Temp%
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_PIDIEF.OB Installation This Trojan drops and executes the following files: %Temp
This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website. It executes the dropped file(s). As a
This hacking tool is a free program from 3proxy . It is an HTTP/HTTPS proxy with FTP over HTTP support. It is used by other malware, specifically by VBS_PENEPE.C , in performing its backdoor
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_VBCLIK.SMI Other Details This Trojan does the following: It starts the malware
This specially crafted PDF file drops and execute a malicious file, game.exe. The dropped file is detected by Trend Micro as WORM_EMOTI.A. This Trojan arrives as an attachment to email messages
Propagation The said .INF file contains the following strings: [autorun] shellexecute=Wscript.exe /e:vbs winfile.jpg Other Details This Trojan does the following: This is Trend Micro detection for
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. As of this writing, the said sites are inaccessible. Arrival Details This Trojan arrives
This Trojan may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded
Trend Micro has flagged this Trojan as noteworthy due to the multiple samples of this malware received from multiple, independent sources, including customer reports and internal sources. This
This spyware may be unknowingly downloaded by a user while visiting malicious websites. It retrieves specific information from the affected system. It deletes itself after execution. Arrival Details
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a