Keyword: JS_XORBAT.A
99740 Total Search   |   Showing Results : 2301 - 2320
download its configuration file: http://{BLOCKED}natown.info/sqlvarch.php NOTES: The malware is installed as a Google Chrome extension or Mozilla Firefox add-on using the following names: Mozilla Service
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan executes when a user accesses certain websites where it is hosted. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan executes when a user accesses
downloaded by a user while visiting the following malicious websites: http://www.{BLOCKED}cker24.com.tw/biz2zs/ttss.exe Installation This spyware adds the following folders: %Application Data%\{random1}
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
It takes advantage of the Use-after-free vulnerability in the Peer Objects component in Microsoft Internet Explorer to download possibly malicious files. This Trojan may be hosted on a website and
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
NOTES: Arrival Details This malware may be installed remotely by a malicious user. Other Details It is a component of other malware that are capable of remote web-based file access and manipulation.
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It requires being executed with a specific argument/parameter, an additional component, or
This Trojan modifies registry entries to disable various system services. This action prevents most of the system functions to be used. It does not have any propagation routine. It does not have any
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website.
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be