Keyword: js_xorbat.b22
39524 Total Search   |   Showing Results : 1 - 20
   Next  
Description Name: NEMUCOD - HTTP (Request) - Variant 5 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as N/A. This also indicates a malware infection. Below are some indicators of an infected host:...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
Description Name: XORBAT - Ransomware - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as N/A. This also indicates a malware infection. Below are some indicators of an infected host:...
Lectool 1007711* - Ransomware XORBAT Suspicious Server Ransomware Activity 1007582* - Ransomware Lectool-1 Web Application Common 1009319 - ImageMagick 'ReadMATImage' Use After Free Vulnerability
%Windows%\winsxs\amd64_prnso002.inf_31bf3856ad364e35_6.1.7600.16385_none_419ce09d71f61ee8\Amd64 %Program Files%\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer
\S-1-5-21-2407829820-1079796033-203259571-500\Software\ AppDataLow\Software\MPMP\ Plugins\47 HKEY_USERS\S-1-5-21-2407829820-1079796033-203259571-500\Software\ AppDataLow\Software\MPMP\ Plugins\22 HKEY_USERS
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\User Data\Default\Extensions\{Extension ID}\13.917.16.52171_0\js\ajax.js %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{Extension ID}\13.917.16.52171_0\js\babAPI.js %AppDataLocal%\Google
%User Profile%\login\css %User Profile%\css\retina %User Profile%\login\images %User Profile%\images\retina %User Profile%\login\js %User Profile%\login\languages %User Profile%\css\platform %Program
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
{65D5AFFB-D4EF-49AA-GFFG-5DA5E12E300A} FLast = "%Desktop%.htt" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CLSID\{65D5AFFB-D4EF-49AA-GFFG-5DA5E12E300A} FNum = "b" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CLSID\{65D5AFFB-D4EF-49AA-GFFG-5DA5E12E300A