Search
Keyword: js_nindya.a
This Trojan executes when a user accesses certain websites where it is hosted. This is the Trend Micro detection for files that contain malicious IFRAME tags. Arrival Details This Trojan executes
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Other Details This Trojan
This Trojan executes when a user accesses certain websites where it is hosted. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan executes when a
This Trojan may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This Trojan
This is the Trend Micro detection for files that exhibit certain behaviors. NOTES: Other Details This is the Trend Micro detection for: script files that contains a malicious Javascript code. It does
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan redirects browsers to certain sites. Other Details This Trojan redirects browsers to the following sites: http://{BLOCKED}us.com.mx/1.html
makes use of spammed email messages that contains text alleging the death of a certain famous celebrity. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan may be unknowingly
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It redirects browsers to certain sites. Arrival Details This Trojan may be unknowingly downloaded by a user
This Trojan executes when a user accesses certain websites where it is hosted. However, as of this writing, the said sites are inaccessible. It redirects browsers to certain sites. Arrival Details
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Download Routine This Trojan accesses the following websites
However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. It redirects
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It executes when a user accesses certain websites where it is hosted. However, as of this writing, the said sites
This Trojan may be dropped by other malware. It executes then deletes itself afterward. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan executes when a user accesses certain websites where it is hosted. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan executes when a user accesses
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. Installation This Trojan drops
This Trojan arrives as a component bundled with malware/grayware packages. It connects to certain websites to send and receive information. Arrival Details This Trojan arrives as a component bundled
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files