Keyword: js_nindya.a
99731 Total Search   |   Showing Results : 1701 - 1720
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This Trojan may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This Trojan
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. It may be downloaded from
This spyware may be hosted on a website and run when a user accesses the said website. Arrival Details This spyware may be hosted on a website and run when a user accesses the said website. Other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This ransomware is written in Jscript, a scripting language designed for Windows. Particularly, it is for Internet Explorer. Note that it requires Windows Script Host execution. To get a one-glance
shortcut files (.LNK) dropped as a component by JS_BONDAT malware family to execute JS_BONDAT copies in removable drives. It executes the following file: {removable drive}\.Trashes\{random number}\{random
arrives through a DOC file. It is embedded and will execute its routine upon activation by the user. However, as of this writing, the said sites are inaccessible. TrojanDownloader:JS/Nemucod (Microsoft);
not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor routine. Download Routine This Trojan connects to the following website(s) to download and execute a malicious
This Trojan arrives as attachment to mass-mailed email messages. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Installation This Trojan drops the following files:
following website(s) to download and execute a malicious file: http://{BLOCKED}achviettech.com/system/logs/98yg7b It saves the files it downloads using the following names: %User Temp%\hQI6niJ7Pj.exe (Note:
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
As of this writing, the said sites are inaccessible. It arrives as attachment to mass-mailed email messages. Installation This Trojan drops the following files: %User Temp%\{Random String} %User Temp
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. It redirects
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain malicious IFRAME tags. It inserts an IFRAME tag that
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be