Keyword: JS_Generic
34305 Total Search   |   Showing Results : 161 - 180
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
Arrival Details This malware arrives via the following means: It may be downloaded from remote sites and installed manually by the user. Installation This potentially unwanted application drops the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
\jgsmkrj.dll (Note: %System% is the Windows system folder, which is usually C:\Windows\System32.) This report is generated via an automated analysis system. Trojan:Win32/Vundo.OD (Microsoft); Generic Malware.fv
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. As of this writing, the said sites are inaccessible. Arrival Details This Trojan arrives
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It inserts an IFRAME tag that redirects users to certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This report is generated via an automated analysis system. Backdoor:Win32/Kelihos.F (Microsoft); Generic FakeAlert.ama (McAfee); Packed.Generic.361 (Symantec); Trojan-Dropper.Win32.Daws.amlc (Kaspersky);
Trojan:Win32/Cleaman.B (Microsoft); Generic Downloader.mw (McAfee); Packed.Generic.362 (Symantec); Trojan-Downloader.Win32.Dapato.jka (Kaspersky); Trojan.Win32.Cleaman.ga (v) (Sunbelt); Trojan.Generic.KDV.583045 (FSecure)
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a