Keyword: JS_JSSHELL
4698 Total Search   |   Showing Results : 3161 - 3180
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
JS_CRYPTED.SMM accesses this malicious website to download files.
JS_REDIRECT.BB connects to this possibly malicious URL.
JS_PIDIEF.XF executes certain files from this site.
related to HTML_AGENTT.AMF.
When executed, TROJ_ADLOAD.YG connects to this malicious URL.
When executed, TROJ_ADLOAD.YG connects to this malicious URL.
When executed, TROJ_ADLOAD.YG connects to this malicious URL.
When executed, TROJ_ADLOAD.YG connects to this malicious URL.
When executed, TROJ_ADLOAD.YG connects to this malicious URL.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is a Trend Micro detection for a backdoor component exploiting a Java Runtime Environments (JRE) vulnerability. This backdoor may be downloaded by other malware/grayware from remote sites. It
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It also has rootkit capabilities, which enables it to
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry entries to enable its
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It adds registry entries to enable its automatic execution at every system startup. Arrival Details This Trojan may
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be
This backdoor may be hosted on a website and run when a user accesses the said website. It executes commands from a remote malicious user, effectively compromising the affected system. As of this
This backdoor acts as a proxy server that intercepts requests from certain Internet browsers and points them to the proxy server on port 63414. It monitors certain strings in the address bar of the