Search
Keyword: JS_WONKA
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival Details
\plugins %Program Files%\IEPro\plugins\accuweather %Program Files%\IEPro\plugins\accuweather\css %Program Files%\IEPro\plugins\accuweather\images %Program Files%\IEPro\plugins\accuweather\js %Program Files%
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This File infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and
\Chrome\nklfajnmfbchcceflgddnkignfheooic\6.0.4_0\assets\js\jquery-1.7.1.min.js %All Users Profile%\B5TTmp\6.0.4\Extensions\Chrome\nklfajnmfbchcceflgddnkignfheooic\6.0.4_0\assets\js\tinyScrollbar.js %All
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It enables its automatic
As of this writing, the said sites are inaccessible. Download Routine As of this writing, the said sites are inaccessible. Other Details This Trojan attempts to access the following websites to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
{1B66D3B7-695D-44FB-997F-E527C0B18FE4} %User Temp%\~zm_{1B66D3B7-695D-44FB-997F-E527C0B18FE4}\css %User Temp%\~zm_{1B66D3B7-695D-44FB-997F-E527C0B18FE4}\images %User Temp%\~zm_{1B66D3B7-695D-44FB-997F-E527C0B18FE4}\js %User Temp%\~zm_
Once users access any of the monitored sites, it starts logging keystrokes. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
{FDDE14E4-38D3-4D8D-B39A-02F652BE30EA} %User Temp%\~zm_{FDDE14E4-38D3-4D8D-B39A-02F652BE30EA}\css %User Temp%\~zm_{FDDE14E4-38D3-4D8D-B39A-02F652BE30EA}\images %User Temp%\~zm_{FDDE14E4-38D3-4D8D-B39A-02F652BE30EA}\js %User Temp%\~zm_
{2269878F-FAAC-4522-AA0E-B00A862A8129} %User Temp%\~zm_{2269878F-FAAC-4522-AA0E-B00A862A8129}\css %User Temp%\~zm_{2269878F-FAAC-4522-AA0E-B00A862A8129}\images %User Temp%\~zm_{2269878F-FAAC-4522-AA0E-B00A862A8129}\js %User Temp%\~zm_