Keyword: js_nindya.a
99740 Total Search   |   Showing Results : 2881 - 2900
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be dropped by the
malware. It arrives as a component bundled with malware/grayware packages. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by other
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Rogue Antivirus Routine
This Trojan connects to a Web site to download and execute a malicious file. Download Routine This Trojan connects to the following Web site(s) to download and execute a malicious file: http://
files that contain a malicious script. Arrival Details This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Download Routine As of this writing, the
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan may be dropped by other malware. It arrives as a component
This Trojan is a specially crafted PDF file which when viewed or executed, may allow a malicious user to take control over an affected system. Other Details This specially crafted PDF file contains
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. Other Details Based on analysis of the codes, it has the following capabilities: takes
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following file(s)/component(s):
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following component file(s):
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Download Routine This
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
Description Name: RECOZEN - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of...
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following files: {grayware path}\ChromeExtension
NOTES: This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. The script checks for the affected system's Web Browser and its
DRIDEX. Should the user click on the malicious link that is supposed to be his/her bill, a JS file will then be downloaded. The file infects the user's machine once it's executed. The links are already
JS_EXPLOIT.MEA loads this site where its component for decoding base64 can be found. This malicious script was inserted onto a legitimate website of the US Department of Labor and downloads a Poison
JS_DLOADER.SMGA connects to this site to download a malicious file detected as BKDR_AGENT.BCSG. JS_DLOADER.SMGA exploits a CVE-2012-1875 vulnerability.
JS_DLOADER.SMGA connects to this URL to download a malicious file detected as TROJ_AGENT.BCSH. JS_DLOADER.SMGA exploits a CVE-2012-1875 vulnerability in Internet Explorer .