Keyword: JS_SMALL
6012 Total Search   |   Showing Results : 821 - 840
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
{9A4D6164-3B42-49F8-BC4E-994FD0F47CEC} %User Temp%\~zm_{9A4D6164-3B42-49F8-BC4E-994FD0F47CEC}\css %User Temp%\~zm_{9A4D6164-3B42-49F8-BC4E-994FD0F47CEC}\images %User Temp%\~zm_{9A4D6164-3B42-49F8-BC4E-994FD0F47CEC}\js %User Temp%\~zm_
{DFF4AC21-0847-4288-9A54-688DCFF77420} %User Temp%\~zm_{DFF4AC21-0847-4288-9A54-688DCFF77420}\css %User Temp%\~zm_{DFF4AC21-0847-4288-9A54-688DCFF77420}\images %User Temp%\~zm_{DFF4AC21-0847-4288-9A54-688DCFF77420}\js %User Temp%\~zm_
{AD171861-7BED-43CF-8497-53B4B3E9B0CC} %User Temp%\~zm_{AD171861-7BED-43CF-8497-53B4B3E9B0CC}\css %User Temp%\~zm_{AD171861-7BED-43CF-8497-53B4B3E9B0CC}\images %User Temp%\~zm_{AD171861-7BED-43CF-8497-53B4B3E9B0CC}\js %User Temp%\~zm_
{1B66D3B7-695D-44FB-997F-E527C0B18FE4} %User Temp%\~zm_{1B66D3B7-695D-44FB-997F-E527C0B18FE4}\css %User Temp%\~zm_{1B66D3B7-695D-44FB-997F-E527C0B18FE4}\images %User Temp%\~zm_{1B66D3B7-695D-44FB-997F-E527C0B18FE4}\js %User Temp%\~zm_
{CBBE3E34-FBAD-4F34-8FA8-3C0C9A5AE973} %User Temp%\~zm_{CBBE3E34-FBAD-4F34-8FA8-3C0C9A5AE973}\css %User Temp%\~zm_{CBBE3E34-FBAD-4F34-8FA8-3C0C9A5AE973}\images %User Temp%\~zm_{CBBE3E34-FBAD-4F34-8FA8-3C0C9A5AE973}\js %User Temp%\~zm_
{AD677642-49E6-45D6-9611-BF905D83EA15} %User Temp%\~zm_{AD677642-49E6-45D6-9611-BF905D83EA15}\css %User Temp%\~zm_{AD677642-49E6-45D6-9611-BF905D83EA15}\images %User Temp%\~zm_{AD677642-49E6-45D6-9611-BF905D83EA15}\js %User Temp%\~zm_
{F98CD95B-CCF0-423C-94A8-0C196F3B36CD} %User Temp%\~zm_{F98CD95B-CCF0-423C-94A8-0C196F3B36CD}\css %User Temp%\~zm_{F98CD95B-CCF0-423C-94A8-0C196F3B36CD}\images %User Temp%\~zm_{F98CD95B-CCF0-423C-94A8-0C196F3B36CD}\js %User Temp%\~zm_
\icons %User Temp%\~zm_{118D1B20-48E0-4AE2-9973-20433C2D374C}\js %User Temp%\~zm_{118D1B20-48E0-4AE2-9973-20433C2D374C}\js\bramus %User Temp%\~zm_{118D1B20-48E0-4AE2-9973-20433C2D374C}\js\prototype %User
{FDDE14E4-38D3-4D8D-B39A-02F652BE30EA} %User Temp%\~zm_{FDDE14E4-38D3-4D8D-B39A-02F652BE30EA}\css %User Temp%\~zm_{FDDE14E4-38D3-4D8D-B39A-02F652BE30EA}\images %User Temp%\~zm_{FDDE14E4-38D3-4D8D-B39A-02F652BE30EA}\js %User Temp%\~zm_
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be downloaded from
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
{2269878F-FAAC-4522-AA0E-B00A862A8129} %User Temp%\~zm_{2269878F-FAAC-4522-AA0E-B00A862A8129}\css %User Temp%\~zm_{2269878F-FAAC-4522-AA0E-B00A862A8129}\images %User Temp%\~zm_{2269878F-FAAC-4522-AA0E-B00A862A8129}\js %User Temp%\~zm_
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a