Keyword: JS_XORBAT.A
99879 Total Search   |   Showing Results : 2881 - 2900
downloaded by a user while visiting the following malicious websites: http://{BLOCKED}et:81/sx14nx7/fda.exe Installation This spyware adds the following folders: %Application Data%\{random1} %Application Data%
(IE) activities of the affected system, specifically the address bar or title bar. It recreates a legitimate website with a spoofed login page if a user visits banking sites with the following strings
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
(IE) activities of the affected system, specifically the address bar or title bar. It recreates a legitimate website with a spoofed login page if a user visits banking sites with the following strings
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This Trojan executes when a user accesses certain websites where it is hosted. It redirects browsers to certain sites. However, as of this writing, the said sites are inaccessible. Arrival Details
This Trojan executes when a user accesses certain websites where it is hosted. It is a component of other malware. It requires its main component to successfully perform its intended routine. Arrival
JS_EXPLOIT.MEA accesses the following websites to download a file, detected as BKDR_POISON.MEA. JS_EXPLOIT.MEA was inserted onto a legitimate website of the US Department of Labor and downloads a
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be dropped by the
malware. It arrives as a component bundled with malware/grayware packages. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by other
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Rogue Antivirus Routine
This Trojan connects to a Web site to download and execute a malicious file. Download Routine This Trojan connects to the following Web site(s) to download and execute a malicious file: http://
files that contain a malicious script. Arrival Details This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Download Routine As of this writing, the
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan may be dropped by other malware. It arrives as a component
This Trojan is a specially crafted PDF file which when viewed or executed, may allow a malicious user to take control over an affected system. Other Details This specially crafted PDF file contains
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. Other Details Based on analysis of the codes, it has the following capabilities: takes
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following file(s)/component(s):
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following component file(s):
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Download Routine This