Keyword: js_nindya.a
99879 Total Search   |   Showing Results : 2901 - 2920
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following files: {grayware path}\ChromeExtension
Description Name: RECOZEN - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of...
DRIDEX. Should the user click on the malicious link that is supposed to be his/her bill, a JS file will then be downloaded. The file infects the user's machine once it's executed. The links are already
JS_EXPLOIT.MEA loads this site where its component for decoding base64 can be found. This malicious script was inserted onto a legitimate website of the US Department of Labor and downloads a Poison
JS_DLOADER.SMGA connects to this site to download a malicious file detected as BKDR_AGENT.BCSG. JS_DLOADER.SMGA exploits a CVE-2012-1875 vulnerability.
JS_DLOADER.SMGA connects to this URL to download a malicious file detected as TROJ_AGENT.BCSH. JS_DLOADER.SMGA exploits a CVE-2012-1875 vulnerability in Internet Explorer .
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It redirects browsers to certain sites. Arrival Details This Trojan may be unknowingly downloaded by a user
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. However, as of this writing, the said sites are inaccessible. Other Details This
drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It deletes the initially executed copy of itself. Arrival Details This worm
This file infector drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This file infector drops the following
executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. It does not have any downloading capability. It does not have any information-stealing
This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan arrives as a component bundled with malware/grayware packages. Installation This Trojan drops
This Trojan executes when a user accesses certain websites where it is hosted. As of this writing, the said sites are inaccessible. Arrival Details This Trojan executes when a user accesses certain
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the said sites are inaccessible. It accesses websites to download files. This
This Trojan takes advantage of software vulnerabilities to allow a remote user or malware/grayware to download files. Download Routine This Trojan takes advantage of the following software
However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. It inserts an IFRAME
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were
However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. It inserts an IFRAME
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were