Keyword: JS_WONKA
4705 Total Search   |   Showing Results : 2001 - 2020
This malware is related to a spammed message that leverages the news on “Royal Baby." The said spammed message lures users in accessing the related blog which is in actual
This is the Trend Micro detection for malicious scripts that redirect users to the website http://{BLOCKED}9.cn . This Trojan may be unknowingly downloaded by a user while visiting malicious
NOTES: This is Trend Micro's generic detection for JavaScript malware that take advantage of the com.ms.activeX.ActiveXComponent security vulnerability on unpatched Internet Explorer browsers. This
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan arrives as a
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain a malicious script. Arrival Details This Trojan may be
This spyware may be dropped by other malware. It connects to certain websites to send and receive information. Arrival Details This spyware may be dropped by other malware. Installation This spyware
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. NOTES: It connects to any
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan may be hosted on a website and run when a user accesses the said website. Once a compromised site is visited, the user is redirected to a certain malicious site. Arrival Details This
This malware is related to the malicious link spammed via Facebook that allegedly points to a video recording of a young woman committing suicide on camera. When executed it drops malicious files and
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan executes when a user accesses certain websites where it is hosted. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan executes when a
This Trojan may be dropped by other malware. It is used to load and execute a file. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan is used to load and execute
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain a malicious script. It redirects browsers to certain