Keyword: bkdr_back.b
34089 Total Search   |   Showing Results : 341 - 360
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
accdb accde accdr accdt ach acr act adb ads agdl ai ait al apj arw asf asm asp aspx asx avi awg back backup backupdb bak bank bay bdb bgt bik bin bkf bkp blend bpw c cab cdf cdr cdr3 cdr4 cdr5 cdr6 cdrw
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
htm dbf 3dm 3ds 3fr jar 3g2 xml png tif 3gp java jpe jpeg jpg jsp php 3pr 7z ab4 accdb accde accdr accdt ach kbx acr act adb ads agdl ai ait al apj arw asf asm asx avi awg back backup backupdb pbl bank
size} - Set default client thread stack size -t - Run silently -i{IP Address} - Accept connections -e{IP Address} - Connect to server -r{Host/IP:Port} - Establish connect back proxy on specified IP -4 -
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
Process Termination This Ransomware terminates the following services if found on the affected system: back xchange ackup acronis sql enterprise sophos veeam acrsch antivirus bedbg dcagent epsecurity
reboot restart shutdown logoff back Ransomware Routine This Ransomware avoids encrypting files with the following strings in their file name: ntuser.dat* iconcache.db gdipfont*.dat ntuser.ini usrclass.dat
download files. It creates an HTTP server with the format http://{IP address}:{Random port} to propagate over the Internet. It deletes all system restore points to disable user from reverting back to a
poll interval in milliseconds (default: 1000) --self-select=URL self-select block templates from URL --submit-to-originalso submit solution back to self-select URL -r, --retries=N number of times to
agdl ai aiff ait al aoi apj arc arw asc asf asm asp aspx asx avi awg back backup backupdb bak bank bat bay bdb bgt bik bin bkp blend bmp bpw brd c cdf cdr cdr3 cdr4 cdr5 cdr6 cdrw cdx ce1 ce2 cer cfg cgm
avi awg back backup backupdb bak bank bat bay bdb bgt bik bin bkp blend bmp bpw brd c cdf cdr cdr3 cdr4 cdr5 cdr6 cdrw cdx ce1 ce2 cer cfg cgm cib class cls cmd cmt conf config contact cpi cpp cr2 craw