Keyword: JS_PETCH
4703 Total Search   |   Showing Results : 3541 - 3560
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It does not have
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be unknowingly downloaded by a user while
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
gsf ims indd iss jpeg jpe jpg js kdc kwm md mdb mdf mef mrw nef nrw odb odm odp ods odt orf p12 p7b p7c pas pdd pdf pef pem pfx php pl ppt pptm pptx psd pst ptx pwm py r3d raf rar raw rgx rik rtf rw2
}zduo52siy.tor2web.blutmagie.de It encrypts files with the following extensions: 3fr 7z acc ai arw bas bay bl c cdr cer cpp cr2 crt crw cs db dbf dcr dd dds der dng doc docm docx dwg dxf dxg end eps erf groups indd jpe jpeg jpg js
This malware is related to a cyberespionage campaign that uses an Ichitaro zero-day vulnerability, or the Multiple Ichitaro Products Unspecified Remote Code Execution Vulnerability (CVE-2014-7247) To
blend bpdr bpdu bsdr bsdu c cdr cer config cpp cr2 crt crw cs dbf dbx dcr dd dds der dng doc docm docx dwg dxf dxg eps erf fdb gdb groups gsd gsf ims indd iss jpe jpeg jpg js kdc kwm md mdb mdf mef mrw
sav lbf slm bik epk rgss3a pak big unity3d wotreplay xxx desc py m3u flv js css rb png jpeg txt p7c p7b p12 pfx pem crt cer der x3f srw pef ptx r3d rw2 rwl raw raf orf nrw mrwref mef erf kdc dcr cr2 crw
jpeg jpg js kdc kwm md mdb mdf mef mrw nef nrw odb odm odp ods odt orf p12 p7b p7c pas pdd pdf pef pem pfx php pl ppt pptm pptx psd pst ptx pwm py r3d raf rar raw rgx rik rtf rw2 rwl safe sql srf srw txt