Keyword: JS_XORBAT.A
99702 Total Search   |   Showing Results : 41 - 60
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
banking or finance-related websites. Infection Points This Trojan arrives as a file downloaded from the following URLs: http://{BLOCKED}7.ru/fastflux/norton_update/files/update.exe Installation This Trojan
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
downloaded by a user while visiting the following malicious websites: http://{BLOCKED}.{BLOCKED}.153.101/admminner.exe Installation This spyware adds the following folders: %Application Data%\{random1}
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
as a file downloaded from the following URLs: http://{BLOCKED}yeew.ru/bin/thootham.exe Installation This Trojan adds the following folders: %Application Data%\{random1} %Application Data%\{random2}
unauthorized use of the stolen data. Once users access any of the monitored sites, it starts logging keystrokes. It attempts to get information from a list of banks or financial institutions. Infection Points
banking or finance-related websites. It attempts to get information from a list of banks or financial institutions. Infection Points This spyware arrives as a file downloaded from the following URLs:
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It modifies the Internet
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
banking or finance-related websites. It attempts to get information from a list of banks or financial institutions. Infection Points This spyware arrives as a file downloaded from the following URLs: