Keyword: JS_JSSHELL
4698 Total Search   |   Showing Results : 4021 - 4040
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Hacking Tool may be hosted on a website and run when a user accesses the said website. Arrival Details This Hacking Tool may be hosted on a website and run when a user accesses the said website.
This Trojan Spy arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It does not have any backdoor routine. This is the Trend Micro
Description Name: WATERHOLE - HTTP (Request) . This is the Trend Micro detection for malicious HTTP network packet that manifest any of the following actions:CallbackThis attack is used for Command and Control CommunicationRelated Malware: JS_WATERHO...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals certain information from the system and/or
inx ipf ipx itc2 itdb itl itm itw iwd iwi j j2c j2k jar jarvis jas java jb2 jbig jbig2 jbmp jbr jfif jia jis jng joe jp1 jp2 jpe jpeg jpg jpg2 jps jpx jrtf js jtf jtx jwl jxr kdb kdbx kdc kdi kdk kes kf
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals certain information from the system and/or
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It runs certain commands that it receives remotely
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It enables its automatic execution at every system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is capable of encrypting files in the affected
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals certain information from the system and/or
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan may be hosted on a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user