Keyword: js_nindya.a
99879 Total Search   |   Showing Results : 2581 - 2600
arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled task that executes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It gathers information and reports it to its servers.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Boot malware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. The said files contain data it writes into the MBR
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses Windows Task Scheduler to create a scheduled task
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This Trojan executes when a user accesses certain websites where it is hosted. This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a user visits an affected Web page,
This Trojan executes when a user accesses certain websites where it is hosted. This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a user visits an affected Web page,
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It requires its main
by a user while visiting malicious websites. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan arrives as an attachment to email messages spammed
This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites
banking or finance-related websites. It attempts to get information from a list of banks or financial institutions. Infection Points This spyware arrives as a file downloaded from the following URLs:
downloaded by a user while visiting the following malicious websites: http://{BLOCKED}mpok.net/Scourchl.exe Installation This spyware adds the following folders: %Application Data%\{random1} %Application Data%
bar or title bar. It recreates a legitimate website with a spoofed login page if a user visits banking sites with the following strings in the address bar or title bar: htt*://*cse*javascriptz/index.php