Keyword: js_nindya.a
99732 Total Search   |   Showing Results : 2001 - 2020
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This is the Trend Micro detection for malware that redirect browsers to potentially malicious websites. This Trojan redirects browsers to certain sites. Arrival Details This Trojan may be downloaded
This Trojan may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by the following malware:
This Trojan may be downloaded by other malware/grayware from remote sites. However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for files that contain
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
?partner_id=ARS&language={language}&format=CJSON&var=dynpipclient&version={application version}&newuser=1&mrb= a variant of Win32/Bundled.Toolbar.Ask.G potentially unsafe application (ESET)
\ Windows\CurrentVersion\Internet Settings AutoConfigURL = "https://{BLOCKED}evpnalarm.net/securevpn.js" Download Routine This Trojan connects to the following website(s) to download and execute a malicious
malware/grayware or malicious users. Download Routine This Trojan connects to the following website(s) to download and execute a malicious file: http://{BLOCKED
This malware is related to a spammed message that leverages the news on “Royal Baby." The said spammed message lures users in accessing the related blog which is in actual
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan arrives as a
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan arrives as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Once a user visits an affected Web page, this HTML script launches a hidden
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This malware sends spammed messages on Facebook that promote a bogus music player feature. The official Facebook music player does not need any installation, as is tied to the page itself and is
This is Trend Micro's detection for infected HTML files that contain hidden iframe tags to redirect the user to a malicious URL. This Trojan may be unknowingly downloaded by a user while visiting