Keyword: JS_PETCH
4703 Total Search   |   Showing Results : 3461 - 3480
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This spyware may be unknowingly downloaded by a user while visiting malicious websites. When executed, it adds folders. It injects itself into certain processes as part of its memory residency
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
ddoc ddrw der design dgc djvu dng doc docm docx dot dotm dotx drf drw dwg dxb erbsql erf exf fdb ffd fff fh fhd fpx fxg gray grey gry hbk hpp ibank ibd ibz idx iiq incpas jpeg jpg js kc2 kdbx kdc kpdx
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
dcs ddd ddoc ddrw der design dgc djvu dng doc docm docx dot dotm dotx drf drw dwg dxb erbsql erf exf fdb ffd fff fh fhd fpx fxg gray grey gry hbk hpp ibank ibd ibz idx iiq incpas jpeg jpg js kc2 kdbx
dcs ddd ddoc ddrw der design dgc djvu dng doc docm docx dot dotm dotx drf drw dwg dxb erbsql erf exf fdb ffd fff fh fhd fpx fxg gray grey gry hbk hpp ibank ibd ibz idx iiq incpas jpeg jpg js kc2 kdbx
jpeg jpg js kc2 kdbx kdc kpdx lua mdb mdc mef mfw mmw moneywell mos mpg mrw myd ndd nef nop nrw ns2 ns3 ns4 nsd nsf nsg nsh nwb nx1 nx2 nyf odb odf odg odm odp ods odt orf otg oth otp ots ott p12 p7b p7c
This Trojan may be dropped by other malware. It connects to a website to send and receive information. Arrival Details This Trojan may be dropped by the following malware: BREX_EUPUDS.GHR It may be
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It runs certain commands that it receives remotely
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It runs
This malware, which is known for its HOSTS file modification routines, is related to the SIMDA botnet. Last April 2015, Trend Micro together with Cyber Defense Institute, Interpol, and other security
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It runs certain commands that it receives remotely
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
m3u flv js css rb png jpeg txt p7c p7b p12 pfx pem crt cer der x3f srw pef ptx r3d rw2 rwl raw raf orf nrw mrwref mef erf kdc dcr cr2 crw bay sr2 srf arw 3fr dng jpe jpg cdr indd ai eps pdf pdd psd dbf
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result,