Keyword: js_nindya.a
99879 Total Search   |   Showing Results : 2881 - 2900
(IE) activities of the affected system, specifically the address bar or title bar. It recreates a legitimate website with a spoofed login page if a user visits banking sites with the following strings
This Trojan executes when a user accesses certain websites where it is hosted. It redirects browsers to certain sites. However, as of this writing, the said sites are inaccessible. Arrival Details
(IE) activities of the affected system, specifically the address bar or title bar. It recreates a legitimate website with a spoofed login page if a user visits banking sites with the following strings
downloaded by a user while visiting the following malicious websites: http://{BLOCKED}et:81/sx14nx7/fda.exe Installation This spyware adds the following folders: %Application Data%\{random1} %Application Data%
This Trojan executes when a user accesses certain websites where it is hosted. It is a component of other malware. It requires its main component to successfully perform its intended routine. Arrival
JS_EXPLOIT.MEA accesses the following websites to download a file, detected as BKDR_POISON.MEA. JS_EXPLOIT.MEA was inserted onto a legitimate website of the US Department of Labor and downloads a
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Rogue Antivirus Routine
This Trojan connects to a Web site to download and execute a malicious file. Download Routine This Trojan connects to the following Web site(s) to download and execute a malicious file: http://
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be dropped by the
malware. It arrives as a component bundled with malware/grayware packages. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by other
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. Other Details Based on analysis of the codes, it has the following capabilities: takes
files that contain a malicious script. Arrival Details This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Download Routine As of this writing, the
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan may be dropped by other malware. It arrives as a component
This Trojan is a specially crafted PDF file which when viewed or executed, may allow a malicious user to take control over an affected system. Other Details This specially crafted PDF file contains
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following file(s)/component(s):
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following component file(s):
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Download Routine This
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
NOTES: This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. The script checks for the affected system's Web Browser and its