Keyword: JS_JSSHELL
4705 Total Search   |   Showing Results : 3861 - 3880
This malware is involved in the DRIDEX malspam campaign that was spotted in early November 2014. It purports itself as a word document with malicious macro code that then downloads DRIDEX onto the
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is capable of encrypting files in the affected
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the user's
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
erbsql erf exf fdb ffd fff fh fhd fpx fxg gray grey gry hbk hpp ibank awg backup backupdb ibd ibz idx iiq incpas jpeg jpg js kc2 kdbx kdc kpdx lua mdb mdc mef mfw mmw moneywell mos mpg mrw myd ndd nef nop
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy steals certain information from the system and/or the user. It connects to certain websites to send and receive information. Installation This Trojan Spy drops the following files:
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It requires
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
iiq incpas indd jar java jnt jpe jpeg jpg js kc2 kdbx kdc key kpdx kwm laccdb lay lay6 ldf lit log lua m m2ts m3u m4p m4u m4v mapimail max mbx md mdb mdc mdf mef mfw mid mkv mlb mml mmw mny moneywell
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is capable of encrypting files in the affected
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival Details
jif jiff jnt joe jp1 jpc jpe jpeg jpf jpg jpgx jpm jpw jrf jrl jrprint js jsd json jsp jspa jspx jtd jtdc jtt jtx just jw jwl jww k25 kbd kbf kc2 kdb kdbx kdc kde kdf kes key keynote key-tef kf kfm kfp
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It encrypts files
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
icxs idl ifo indd inf inf_loc ini itdb itl itm iwd iwi jfif jpe jpeg jpg js kdb kdc kf layout lbf lck lib litemod lnk log log1 log2 lrf ltx lvl m2 m3u m4a man manifest map mcgame mcmeta mdb mdbackup