Keyword: w32bu
74628 Total Search   |   Showing Results : 401 - 420
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It lowers the security setting of Internet Explorer.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
vor vp vpcbackup vpd vpk vpl vpol vpp vpp_pc vpx vrb vrd VRG vrp vs vsch vscontent vsd VSDIR vsdx vsf vsi vspolicy vssm vssx vst vstx vsv vsx vtf vthought vtv vtx vud vvf vvv vw vw3 vxml vym vzm w w01
This file infector appends its codes to target files. It infects certain file types by inserting code in the said files. It modifies the Internet Explorer Zone Settings. Arrival Details This malware
This Worm drops a file in the Windows Common Startup folder to enable its automatic execution at every system startup. It terminates certain processes if found running in the affected system's
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Hacking Tool arrives on a
Temp%\screenshots %All Users Profile%\clips\phf %All Users Profile%\clips\phf\W %User Temp%\screenshots\simple (Note: %All Users Profile% is the common user's profile folder, which is usually C:
%AppDataLocal%\Google\Chrome\User Data\Default\Extensions\efaidnbmnnnibpcajpcglclefindmkaj\15.1.1.0_0\data\images\32 \xd0\xa4\xd0\xb0\xd0\xb9\xd0\xbb \xd0\xb7\xd0\xb0\xd1\x88\xd0\xb8\xd1\x84\xd1\x80\xd0\xbe\xd0
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
This Trojan launches a denial of service (DoS) attacks against websites under the .kr domain. Once these sites receive a more-than sufficient amount of requests from various sources, these sites may
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It lowers the security setting of Internet Explorer.
vst vstx vtf vthought vtv vtx vw vw3 w w2p w3g w3x w51 w52 w60 w61 w6bn w6w w8bn w8tn wab wad waff wallet war wav wave waw wb wb2 wb3 wbk wbt wbxml wbz wcf wcl wcn wcp wcst wd0 wd1 wd2 wdbn wdgt wdl wdn
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This