Keyword: JS_XORBAT.B
29553 Total Search   |   Showing Results : 1081 - 1100
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It lowers the security setting of Internet Explorer.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
dazip db0 dba dbf dcr der desc dmp dng doc docm docx dwg dxg epk eps erf esm ff flv forge fos fpk fpt fsh gdb gho hkdb hkx hplg hvpl ibank icxs indd itdb itl itm iwd iwi jpe jpeg jpg js kdb kdc kf layout
This Ransomware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
config cpp cr2 crt crw cs dbf dbx dcr dd dds der dng doc docm docx dwg dxf dxg eps erf fdb gdb gdb groups gsd gsf ims indd iss jpe jpeg jpg js kdc kwm md mdb mdf mef mrw nef nrw odb odm odp ods odt orf p12
This Trojan modifies registry entries to disable various system services. This action prevents most of the system functions to be used. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
dbf dcr dcu dds default der dfm directory disc dmg dng doc docm docx dtd dvd dwg dxf eip emf eml eps epub erf fff flv frm gfx gif gzip h htm html idl iiq indd inf iso jar java jfif jge jpe jpeg jpg js
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
itl itm iwd iwi jac jar jav java jbc jc jfif jge jgz jif jiff jks jnt jpc jpe jpeg jpf jpg jpw js json jsp just k25 kc2 kdb kdbx kdc kde key kf klq kml kmz kpdx kwd kwm laccdb lastlogin lay lay6 layout
dds deb dem dif doc docm docx dotm dotx eps flv fnt fon fpx gam ged gif gz h htm html ics iff indd ini iso j2c j2k java jfif jif jp2 jpeg jpg jpx js json jsp key keychain log lua m3u m4a m4v max mdb mht
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Adware arrives on a system as a
This ransomware comes from a high volume spam campaign that aims to deliver this to as many users possible. This Ransomware arrives on a system as a file dropped by other malware or as a file
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
automaticdestinations-ms aux av avi avn avs awd awe awg awp aws awt aww awwp ax azf azs azw azw1 azw3 azw4 b b27 b2a back backup backupdb bad bak bak~ bamboopaper bank bar bau bax bay bbcd bbl bbprojectd bbs bbxt bc5 bc6
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It