Keyword: glossary.asp
2325 Total Search   |   Showing Results : 1341 - 1360
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
asm asp aspx avi awk bas bat bmp c cs cls clw cmd cpp csproj css ctl cxx def dep dlg dsp dsw eps f f77 f90 f95 fla flac frm gif h hpp hta htm html hxx ico idl inc ini inl java jpeg jpg js la mak
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from
receive information: http://{BLOCKED}alk32.ru/topic.php It encrypts files with the following extensions: wb2 psd p7c p7b p12 pfx pem crt cer der pl py lua css js asp php incpas asm hpp h cpp c 7z zip rar
}tic.ru:443/topic.php It encrypts files with the following extensions: 3ds 3fr 3pr 7z ab4 ac2 accdb accde accdr accdt acr adb agd1 ai ait al apj arw asm asp awg backup backupdb bak bdb bgt bik bkp blend bpw cdf cdr cdr3
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This file infector arrives by connecting affected removable drives to a system. It arrives via peer-to-peer (P2P) shares. It arrives on a system as a file dropped by other malware or as a file
der pl py lua css js asp php incpas asm hpp h cpp c 7z zip rar drf blend apj 3ds dwg sda ps pat fxg fhd fh dxb drw design ddrw ddoc dcs csl csh cpi cgm cdx cdrw cdr6 cdr5 cdr4 cdr3 cdr awg ait ai agd1
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
{BLOCKED}happy.ru/topic.php It encrypts files with the following extensions: 3ds 3fr 3pr 7z ab4 ac2 accdb accde accdr accdt acr adb agd1 ai ait al apj arw asm asp awg backup backupdb bak bdb bgt bik bkp
This Trojan is the final malware delivered in an attack that exploits the CVE-2014-4114 vulnerability. This Trojan is known to come from a malware family used in targeted attacks against Taiwan-based
This worm arrives via removable drives. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This worm arrives via removable drives.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
the following extensions: 3ds 3fr 3pr 7z ab4 ac2 accdb accde accdr accdt acr adb agd1 ai ait al apj arw asm asp awg backup backupdb bak bdb bgt bik bkp blend bpw cdf cdr cdr3 cdr4 cdr5 cdr6 cdrw cdx ce1
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This