Keyword: usojan.ps1.powload.jkp
54614 Total Search   |   Showing Results : 661 - 680
This ransomware is delivered as an attached document, via spam email. It disguises itself as a fake Thai customs form. Instead of the usual ransom note, MIRCOP demands to be paid back, assuming
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
') "%System%\cmd.exe" /c echo Set-MpPreference -DisableRealtimeMonitoring 1 "%System%\schtasks.exe" /create /ru system /sc MINUTE /mo 120 /tn blackball /F /tr blackball "%System%\schtasks.exe" /create
HKEY_CURRENT_USER\Software\APN PIP\ ARS Top = "91" HKEY_CURRENT_USER\Software\APN PIP\ ARS Left = "148" HKEY_CURRENT_USER\Software\APN PIP\ ARS Show_UI = "1" HKEY_CURRENT_USER\Software\APN PIP\ ARS Cancel_PIP = "1
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages. This Trojan arrives on a
retry before switch to backup server (default: 5) -R, --retry-pause=N — time to pause between retries (default: 5) --cpu-affinity — set process affinity to CPU core(s), mask 0x3 for cores 0 and 1
This ransomware, discovered in April 2016, deletes the files it encrypts on a set time interval should the affected user delay payment. It also uses pornographic imagery in is routines. Users
This ransomware, discovered in April 2016, deletes the files it encrypts on a set time interval should the affected user delay payment. It also uses pornographic imagery in is routines. Users
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
TamperProtection = 4 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows Defender DisableAntiSpyware = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Windows Defender DisableAntiSpyware = 1 HKEY_LOCAL_MACHINE\SOFTWARE
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It connects to a