Keyword: JS_XORBAT.B
29553 Total Search   |   Showing Results : 581 - 600
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself in all removable drives. Arrival
This Trojan Spy may be dropped by other malware. It attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Trojan modifies registry entries to disable various system services. This action prevents most of the system functions to be used. It does not have any propagation routine. It does not have any
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan modifies registry entries to disable various system services. This action prevents most of the system functions to be used. It connects to certain websites to send and receive
This Trojan modifies registry entries to disable various system services. This action prevents most of the system functions to be used. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It injects its dropped file/component to specific
{33AA21EC-0661-41EF-9034-F8CC1BA8CD39} %User Temp%\~zm_{33AA21EC-0661-41EF-9034-F8CC1BA8CD39}\css %User Temp%\~zm_{33AA21EC-0661-41EF-9034-F8CC1BA8CD39}\images %User Temp%\~zm_{33AA21EC-0661-41EF-9034-F8CC1BA8CD39}\js (Note: %User Temp%
{730BE1A4-1263-4096-917C-4484264E4FD6} %User Temp%\~zm_{730BE1A4-1263-4096-917C-4484264E4FD6}\css %User Temp%\~zm_{730BE1A4-1263-4096-917C-4484264E4FD6}\images %User Temp%\~zm_{730BE1A4-1263-4096-917C-4484264E4FD6}\js (Note: %User Temp%
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Adware may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This potentially unwanted application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.