Keyword: JS_WONKA
4689 Total Search   |   Showing Results : 161 - 180
{CBBE3E34-FBAD-4F34-8FA8-3C0C9A5AE973} %User Temp%\~zm_{CBBE3E34-FBAD-4F34-8FA8-3C0C9A5AE973}\css %User Temp%\~zm_{CBBE3E34-FBAD-4F34-8FA8-3C0C9A5AE973}\images %User Temp%\~zm_{CBBE3E34-FBAD-4F34-8FA8-3C0C9A5AE973}\js %User Temp%\~zm_
{AD677642-49E6-45D6-9611-BF905D83EA15} %User Temp%\~zm_{AD677642-49E6-45D6-9611-BF905D83EA15}\css %User Temp%\~zm_{AD677642-49E6-45D6-9611-BF905D83EA15}\images %User Temp%\~zm_{AD677642-49E6-45D6-9611-BF905D83EA15}\js %User Temp%\~zm_
{F98CD95B-CCF0-423C-94A8-0C196F3B36CD} %User Temp%\~zm_{F98CD95B-CCF0-423C-94A8-0C196F3B36CD}\css %User Temp%\~zm_{F98CD95B-CCF0-423C-94A8-0C196F3B36CD}\images %User Temp%\~zm_{F98CD95B-CCF0-423C-94A8-0C196F3B36CD}\js %User Temp%\~zm_
\icons %User Temp%\~zm_{118D1B20-48E0-4AE2-9973-20433C2D374C}\js %User Temp%\~zm_{118D1B20-48E0-4AE2-9973-20433C2D374C}\js\bramus %User Temp%\~zm_{118D1B20-48E0-4AE2-9973-20433C2D374C}\js\prototype %User
{FDDE14E4-38D3-4D8D-B39A-02F652BE30EA} %User Temp%\~zm_{FDDE14E4-38D3-4D8D-B39A-02F652BE30EA}\css %User Temp%\~zm_{FDDE14E4-38D3-4D8D-B39A-02F652BE30EA}\images %User Temp%\~zm_{FDDE14E4-38D3-4D8D-B39A-02F652BE30EA}\js %User Temp%\~zm_
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be downloaded from
Once users access any of the monitored sites, it starts logging keystrokes. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
{2269878F-FAAC-4522-AA0E-B00A862A8129} %User Temp%\~zm_{2269878F-FAAC-4522-AA0E-B00A862A8129}\css %User Temp%\~zm_{2269878F-FAAC-4522-AA0E-B00A862A8129}\images %User Temp%\~zm_{2269878F-FAAC-4522-AA0E-B00A862A8129}\js %User Temp%\~zm_
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\ui\offers\d033278d2583e0fe2b7585ceb4483ad9\img %User Temp%\DLG\ui\common\base\css %User Temp%\DLG\ui\offers\d033278d2583e0fe2b7585ceb4483ad9\js %User Temp%\DLG\ui\common\base\js %User Temp%\DLG\ui
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\ui\offers\1522ef138ba104249c3934a80811f825\img %User Temp%\DLG\ui\offers\1522ef138ba104249c3934a80811f825\js %User Temp%\DLG\ui\common\progress\css %User Temp%\DLG\ui\common\progress\img %User Temp%
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF