Keyword: JS_INJECT
7766 Total Search   |   Showing Results : 101 - 120
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It bears the file icons of certain applications to avoid easy detection and consequent
This Trojan attempts to replace a system file with a copy of itself. This results to the crash of the affected computer. This Trojan may be dropped by other malware. It deletes itself after
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This Trojan may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It does not have any propagation routine. It does not have any backdoor routine. It
This Trojan may be used by its main component to possibly download another file into the system. This Trojan may arrive bundled with malware packages as a malware component. It may be dropped by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It is a component of other malware. It requires its main component to successfully perform its intended routine. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan drops certain files as part of its installation routine. It modifies the certain registry entries. Installation This Trojan drops the following files: %User Temp%\123.info %User Temp%
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It connects to a website to send and receive information. Arrival Details This backdoor may be unknowingly
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This Trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. However, as
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be injected into processes running in memory.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It deletes the initially executed copy of itself. Arrival Details This Trojan arrives as