Keyword: JS_JSSHELL
4693 Total Search   |   Showing Results : 2101 - 2120
This is the Trend Micro detection for files that exhibit certain behaviors. Other Details This is the Trend Micro detection for: for Javascript files that are dropped by the WORM_QAKBOT/BKDR_QAKBOT
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection
This malicious HTML displays a fake video in Facebook , entitled "This is the best April Fools' prank ever!" It links to a malicious JavaScript, which Trend Micro detects as JS_FAKEVID.C. This Trojan
Arrival Details This unknown may be unknowingly downloaded by a user while visiting the following malicious websites: http://{BLOCKED}n/yahoo.js Other Details This unknown attempts to access the
This is the Trend Micro detection for files that exhibit certain behaviors. Other Details This is the Trend Micro detection for: script files that contain a malicious JavaScript code.
However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. It redirects
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malicious JavaScript downloads and executes a CryptoWall 3.0 ransomware variant and a FAREIT spyware. It comes as an archived file that is sent as an attachment in spammed messages. To get a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
%User Profile%\nsupdate\js %User Profile%\nsupdate\img (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
%User Profile%\nsupdate\js %User Profile%\nsupdate\img (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server
This malware is involved in the Cryptowall 3.0 attacks detected on March 2015. It comes as a malicious attachment to socially-engineered spam. Once extracted, it downloads Cryptowall strains onto the
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It inserts an IFRAME tag that redirects users to certain
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It connects to
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files