Keyword: JS_XORBAT.B
29553 Total Search   |   Showing Results : 1101 - 1120
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
JS_OBFUSC.BEB redirects users to this URL if their computers have a particular Adobe Reader version installed. This malware is related to a spammed message that leverages the news on the "Royal Baby."
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives via removable drives. It drops an AUTORUN.INF file to automatically execute the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Infection Points This spyware arrives as a file
\CurrentVersion\ App Paths\wireshark.exe HKEY_CURRENT_USER\SOFTWARE\ZxSniffer HKEY_CURRENT_USER\SOFTWARE\Cygwin HKEY_CURRENT_USER\SOFTWARE\Cygwin HKEY_CURRENT_USER\SOFTWARE\B Labs\Bopup Observer HKEY_CURRENT_USER
\CurrentVersion\App Paths\wireshark.exe HKEY_CURRENT_USER\SOFTWARE\ZxSniffer HKEY_CURRENT_USER\SOFTWARE\Cygwin HKEY_CURRENT_USER\SOFTWARE\Cygwin HKEY_CURRENT_USER\SOFTWARE\B Labs\Bopup Observer HKEY_CURRENT_USER
indd jpe jpeg jpg js kdc kwm mdb mdf md mef mrw nef nrw odb odm odp ods odt orf p12 p7b p7c pdd pdf pef pem pfx php pl pptm ppt pptx psd pst ptx pwm py r3d raf rar raw rtf rw2 rwl safe sql srf srw txt
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
\CurrentVersion\App Paths\wireshark.exe HKEY_CURRENT_USER\SOFTWARE\ZxSniffer HKEY_CURRENT_USER\SOFTWARE\Cygwin HKEY_CURRENT_USER\SOFTWARE\Cygwin HKEY_CURRENT_USER\SOFTWARE\B Labs\Bopup Observer HKEY_CURRENT_USER
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
vpp_pc lrf m2 mcmeta vfs0 mpqge kdb db0 db rofl hkx bar upk das iwi litemod asset forge ltx bsa apk re4 sav lbf slm bik epk rgss3a pak big unity3d wotreplay xxx desc py m3u flv js css rb png jpeg txt p7c
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform