Keyword: JS_XORBAT.B
29584 Total Search   |   Showing Results : 1481 - 1500
Makers of this ransomware scares users by claiming that it posts online all files that it locks and encrypts. It also invites its victims to be affiliated with its makers. It ensures that its victims
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This worm may be downloaded by other malware/grayware/spyware from remote sites. It uses the Windows Task Scheduler to add a scheduled task that executes the copies it drops. It executes commands
This worm may be downloaded by other malware/grayware/spyware from remote sites. It uses the Windows Task Scheduler to add a scheduled task that executes the copies it drops. It executes commands
This worm may be downloaded by other malware/grayware/spyware from remote sites. It uses the Windows Task Scheduler to add a scheduled task that executes the copies it drops. It executes commands
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
dotx drf drw dwg dxb erbsql erf exf fdb ffd fff fh fhd fpx fxg gray grey gry hbk hpp ibank ibd ibz idx iiq incpas jpeg jpg js kc2 kdbx kdc kpdx lua mdb mdc mef mfw mmw moneywell mos mpg mrw myd ndd nef
ibd ibz idx iiq incpas jpeg jpg js kc2 kdbx kdc kpdx lua mdb mdc mef mfw mmw moneywell mos mpg mrw myd ndd nef nop nrw ns2 ns3 ns4 nsd nsf nsg nsh nwb nx1 nx2 nyf odb odf odg odm odp ods odt orf otg oth
p12 pfx pem crt cer der pl py lua css js asp php incpas asm hpp cpp 7z zip rar drf blend apj 3ds dwg sda ps pat fxg fhd fh dxb drw design ddrw ddoc dcs csl csh cpi cgm cdx cdrw cdr6 cdr5 cdr4 cdr3 cdr
p12 pfx pem crt cer der pl py lua css js asp php incpas asm hpp cpp 7z zip rar drf blend apj 3ds dwg sda ps pat fxg fhd fh dxb drw design ddrw ddoc dcs csl csh cpi cgm cdx cdrw cdr6 cdr5 cdr4 cdr3 cdr
incpas jpeg jpg js kc2 kdbx kdc kpdx lua mdb mdc mef mfw mmw moneywell mos mpg mrw myd ndd nef nop nrw ns2 ns3 ns4 nsd nsf nsg nsh nwb nx1 nx2 nyf odb odf odg odm odp ods odt orf otg oth otp ots ott p12
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This crypto-ransomware "speaks", apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in