Keyword: JS_XORBAT.A
100097 Total Search   |   Showing Results : 4361 - 4380
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Hacking Tool arrives on a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
A spam message purporting to be a requested letter is making its rounds, carrying an attachment that is a JavaScript malware. When users open this attachment, their computers are infected with
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It connects to a website to send and receive information. Arrival Details This backdoor
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes when a user accesses certain websites where it is hosted.
This backdoor may be dropped by other malware. It connects to a website to send and receive information. Arrival Details This backdoor may be dropped by the following malware: JS_DROPSIM.A
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Infection Points This spyware arrives as a file
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It executes the downloaded files. As a result, malicious routines of the downloaded
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It executes the downloaded files. As a result, malicious routines of the downloaded
finance-related websites. Infection Points This spyware arrives as a file downloaded from the following URLs: http://{BLOCKED}t.com/xed/yourbot.exe Installation This spyware creates the following folders:
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This worm may be
This Trojan may arrive bundled with malware packages as a malware component. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected
This Trojan executes when a user accesses certain websites where it is hosted. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are