Search
Keyword: usoj_rovnix.pc
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Installation This Trojan
any of the following: html php Ransom:Win32/Urausy.C (MICROSOFT), Trojan.Win32.Reveton.a (v) (SUNBELT) Downloaded from the Internet Locks PC screen, Connects to URLs/IPs
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It scans the computer for registry keys related to
Windows NT 6.1; WOW64; Trident/5.0; SLCC2; Media Center PC 6.0; InfoPath.3; MS-RTC LM 8; Zune 4.7) Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 7.1; Trident/5.0) Mozilla/5.0 (iPad; CPU OS 5_1 like Mac OS X
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This malware is a cross-platform threat, affecting both Android and Windows. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. NOTES:
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
Name by patching its 'DriverEntry' to return STATUS_UNSUCCESSFUL: Agnitum Ltd ALWIL Software PC Tools GRISOFT, s.r.o. Avira GmbH BITDEFENDER LLC BitDefender SRL Comodo Inc Doctor Web Ltd ESET, spol. s
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
DARKCOMET (also known as FYNLOS) is a Remote Administration Tool (RAT) that is used in many targeted attacks. It has the ability to take pictures via webcam, listen in on conversations via a
adware requires its main component to successfully perform its intended routine. NOTES: It is a software updater program that runs in the background of Windows and automatically starts up when your PC
2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C; .NET4.0E) HKEY_CURRENT_USER\Software\{Random String} {Random String 2} = {Random Characters} HKEY_CURRENT_USER
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Ransomware may be downloaded by other malware/grayware/spyware from remote sites. Arrival Details This Ransomware may be downloaded by other malware/grayware/spyware from remote sites. Stolen
ransom note: The "Destroy PC" option shows the following window: Ransom:Win32/Redeye (MICROSOFT); W32/Generic!tr (FORTINET) Dropped by other malware Encrypts files, , Connects to URLs/IPs, Terminates