Keyword: JS_XORBAT.A
99727 Total Search   |   Showing Results : 1761 - 1780
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
files. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival Details This Trojan arrives as an attachment to email messages
This adware may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It does not have any propagation routine. It does not have any backdoor routine. As of
Haiti earthquake as a spam lure. The spammed messages written in Portuguses tricked users into clicking a link that supposedly contains photos of the earthquake. This led to a malicious website that
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. This is the Trend Micro detection for files that contain a malicious script. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It executes the downloaded files. As a result,
This Trojan may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan may be hosted on a
by other malware. It arrives as a component bundled with malware/grayware packages. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
following website(s) to download and execute a malicious file: http://{BLOCKED}ohnung-joos.de/b1bq2 ip: {BLOCKED}.169.145.78 http://{BLOCKED}livelihoods.org/xvq5048y ip: {BLOCKED}.{BLOCKED}.18.27 http://www.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival Details This Trojan arrives as an attachment to email messages spammed by
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
shortcut files (.LNK) dropped as a component by JS_BONDAT malware family to execute JS_BONDAT copies in the system. It is dropped as Windows Explorer.lnk in All Startup folders to automatically execute
This Trojan may be downloaded from remote sites by other malware. It connects to certain websites to send and receive information. Arrival Details This Trojan may be downloaded from remote site(s) by