Keyword: js_nindya.a
99731 Total Search   |   Showing Results : 1701 - 1720
Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the behavior of this
This Trojan may be hosted on a website and run when a user accesses the said website. It may be downloaded from remote sites by other malware. Arrival Details This Trojan may be hosted on a website
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This spyware may be hosted on a website and run when a user accesses the said website. Arrival Details This spyware may be hosted on a website and run when a user accesses the said website. Other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This ransomware is written in Jscript, a scripting language designed for Windows. Particularly, it is for Internet Explorer. Note that it requires Windows Script Host execution. To get a one-glance
shortcut files (.LNK) dropped as a component by JS_BONDAT malware family to execute JS_BONDAT copies in removable drives. It executes the following file: {removable drive}\.Trashes\{random number}\{random
arrives through a DOC file. It is embedded and will execute its routine upon activation by the user. However, as of this writing, the said sites are inaccessible. TrojanDownloader:JS/Nemucod (Microsoft);
following website(s) to download and execute a malicious file: http://{BLOCKED}achviettech.com/system/logs/98yg7b It saves the files it downloads using the following names: %User Temp%\hQI6niJ7Pj.exe (Note:
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as attachment to mass-mailed email messages. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Installation This Trojan drops the following files:
not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor routine. Download Routine This Trojan connects to the following website(s) to download and execute a malicious
As of this writing, the said sites are inaccessible. It arrives as attachment to mass-mailed email messages. Installation This Trojan drops the following files: %User Temp%\{Random String} %User Temp
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain malicious IFRAME tags. It inserts an IFRAME tag that
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be