Keyword: usojan.win32.whispergate.yxcax
74064 Total Search   |   Showing Results : 461 - 480
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It runs certain commands that it receives remotely from a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
64-bit), Windows Server 2008, and Windows Server 2012.) It creates the following folders: %User Profile%\Application Data\Win (Note: %User Profile% is a user's profile folder, where it usually is C:
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders. It
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
It propagates by dropping copies of itself in physical and removable drives. It also propagates over the Internet by attempting to send the exploit code to random Internet addresses. It generates a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
\TypeSupport\Unicode\Mappings\Mac\ReadMe.txt %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\ReadMe.bmp %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win
\TypeSupport\Unicode\Mappings\Mac\ReadMe.txt %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\ReadMe.bmp %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win
\TypeSupport\Unicode\Mappings\Mac\ReadMe.txt %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\ReadMe.bmp %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This