Keyword: bkdr_back.b
34089 Total Search   |   Showing Results : 61 - 80
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This backdoor creates the following folders: %User Temp%\Back Orifice 2000 %User
usernames obtained from the following URL: http://{BLOCKED}e.puzopuzo.biz/cmd.php When this URL is accessed by the backdoor, its C&C server sends back a command, which contains another URL where a text file
information by logging keystrokes. The information it steals are usually system-related information such as operating system version and processor speed. All data are then communicated back to C&C servers
information by logging keystrokes. The information it steals are usually system-related information such as operating system version and processor speed. All data are then communicated back to C&C servers
receive files Uninstall itself REMOSH also steals system information such as computer name, operating system, and processor information. The stolen information is then fed back to its C&C servers.
information by logging keystrokes. The information it steals are usually system-related information such as operating system version and processor speed. All data are then communicated back to C&C servers
dating back to 2008. PlugX allows remote users to perform malicious and data theft routines on a system without the user’s permission or authorization. These malicious routines include: Copying, creating,
remote malicious user: Add Server Remove Server Send Mail Clean - Uninstall/Delete itself and freeing Mail Buffer Reserved - for sending the received data back Add Server By Name - same as Add Server, but
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It encrypts files
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
Crack.exe %System%\drivers32\Lords of the Realm III No-Cd Crack.exe %System%\drivers32\Civilization III - Conquest No-Cd Crack.exe %System%\drivers32\Conflict - Desert Storm II - Back to Baghdad No-Cd
Generator.exe %System%\drivers32\Civilization III - Conquest Serial Generator.exe %System%\drivers32\Conflict - Desert Storm II - Back to Baghdad Serial Generator.exe %System%\drivers32\Harry Potter - Quidditch
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It