Keyword: default5.asp
300 Total Search   |   Showing Results : 141 - 160
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. Once users acce...
This file infector drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
VIRUX variants have been spotted as early as 2009. These file infectors spread across removable drives and network shares. They take advantage of vulnerabilities to infect users' systems. VIRUX variants have also been found in websites that offer sof...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives as attachment to mass-mailed email messages. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It also has rootkit capabilities, which enables it to hide its processes ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This spyware may be dropped by other malware.It uses the Windows Task Scheduler to add a scheduled task that executes the copies it drops.It does not have any propagation routine.It connects to certain websites to send and receive information. It de...
This spyware may be dropped by other malware.It uses the Windows Task Scheduler to add a scheduled task that executes the copies it drops.It does not have any propagation routine.It connects to certain websites to send and receive information. It de...
HELOAG is a family of backdoors. Spotted in 2010, HELOAG comes as a downloaded file from two specific sites.HELOAG connects to a server and performs commands issued from the server. It connects to different IP addresses, depending on what the IP addr...
HELOAG is a family of backdoors. Spotted in 2010, HELOAG comes as a downloaded file from two specific sites.HELOAG connects to a server and performs commands issued from the server. It connects to different IP addresses, depending on what the IP addr...
This worm arrives by connecting affected removable drives to a system. It may be unknowingly downloaded by a user while visiting malicious websites.It drops copies of itself in all removable and physical drives found in the system. It drops an AUTOR...
This Trojan may be downloaded by other malware/grayware from remote sites. It may be dropped by other malware.It uses common file icons to trick a user into thinking that the files are legitimate.
This backdoor may be dropped by other malware.It connects to a website to send and receive information.
VIRUX variants have been spotted as early as 2009. These file infectors spread across removable drives and network shares. They take advantage of vulnerabilities to infect users' systems. VIRUX variants have also been found in websites that offer sof...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files with specific file extensions. It drops files as ransom note. It avoids encrypting fi...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It gathers certain information on the affected computer.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Windows InstallationThis Trojan adds the following mutexes to ensure that only one of its copies runs at any one time: VXLOCK32_64Other DetailsThis Trojan encrypts files with the following extensions: .txt .doc .docx .xls .x...