Keyword: JS_RECOZEN.B
29551 Total Search   |   Showing Results : 1261 - 1280
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Ransomware encrypts files with specific file extensions. It drops files as ransom note. Installation This Ransomware drops the following files: {Malware Folder}\selfd.bat → to delete self and
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
groups gry gtl gto gtp gts gwk gz hbk hdd hkdb hkx hplg hpp html hvpl hwp ibank ibd ibz icxs idb idc idx iif iiq incpas indd info ip ipc ism iso itdb itl itm iwd iwi ix jar java jnt jpe jpeg jpg jrl js jsp
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
JS_EXPLOIT.HBA connects to this site to download files.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It adds registry entries to enable its automatic execution at every system startup. Arrival Details This Trojan may
This Trojan may be hosted on a website and run when a user accesses the said website. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It connects to a website to send and receive information. Arrival Details This backdoor
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays advertisements on Internet browsers. Arrival
This backdoor may be downloaded by other malware/grayware from remote sites. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
following software under certain registry keys : In HKEY_CURRENT_USER\Software : APIS32 B Labs\Bopup Observer CommView Cygwin eEye Digital Security SUPERAntiSpyware.com Syser Soft Win Sniffer ZxSniffer In