Keyword: JS_XORBAT.A
99740 Total Search   |   Showing Results : 2341 - 2360
downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes then deletes itself afterward. It executes the downloaded files. As a result,
executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the said sites are inaccessible. Arrival Details This Trojan
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
following website(s) to download and execute a malicious file: http://{BLOCKED}vidades.com/bsdz22c8 http://www.{BLOCKED}neguy.talktalk.net/31702 http://{BLOCKED}ro.com/2qohq7 It saves the files it downloads
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
This Trojan Spy may be downloaded by other malware/grayware from remote sites. Arrival Details This Trojan Spy may be downloaded by the following malware/grayware from remote sites:
This Trojan may arrive bundled with malware packages as a malware component. Arrival Details This Trojan may arrive bundled with malware packages as a malware component. NOTES: This trojan is an
This Trojan executes when a user accesses certain websites where it is hosted. It contains errors in its code. This stops it from performing its routines. Arrival Details This Trojan executes when a
This Trojan may arrive bundled with malware packages as a malware component. Arrival Details This Trojan may arrive bundled with malware packages as a malware component. NOTES: This Trojan is an
This Trojan executes when a user accesses certain websites where it is hosted. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan executes when a user accesses
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Download Routine This
This Trojan executes when a user accesses certain websites where it is hosted. This is the Trend Micro detection for files that contain malicious IFRAME tags. Arrival Details This Trojan executes
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Other Details This Trojan
This Trojan executes when a user accesses certain websites where it is hosted. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan executes when a
This Trojan may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This Trojan
This is the Trend Micro detection for files that exhibit certain behaviors. NOTES: Other Details This is the Trend Micro detection for: script files that contains a malicious Javascript code. It does