Keyword: JS_Generic
34332 Total Search   |   Showing Results : 2981 - 3000
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
Other Details Based on analysis of the codes, it has the following capabilities: Upon execution, it accesses the URL http://{BLOCKED}e.net/.go/check.html . The said URL may redirect to the following
This Trojan redirects browsers to certain sites. Other Details This Trojan redirects browsers to the following sites: http://{BLOCKED}team.com Connects to URLs/Ips
Other Details This Trojan connects to the following possibly malicious URL: http://{BLOCKED}rkstar.info:8080 http://{BLOCKED}nguide.at:8080 http://{BLOCKED}mecare.at:8080 http://{BLOCKED}be.ru:8080
This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites
Other Details Based on analysis of the codes, it has the following capabilities: Upon execution, it accesses the URL http://{BLOCKED}e.net/.go/check.html . The said URL may redirect to the following
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a
This Trojan may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for files that
This Trojan redirects browsers to certain sites. Other Details This Trojan redirects browsers to the following sites: http://{BLOCKED}ifeasia.com/index3.html
However, as of this writing, the said sites are inaccessible. Arrival Details However, as of this writing, the said sites are inaccessible. Download Routine This Trojan takes advantage of the
However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. It inserts an IFRAME
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. As of this writing, the said sites are inaccessible. This Trojan may be unknowingly
Installation This Trojan drops and executes the following files: %User Temp%\ {malware name}.pdf - non-malicious .PDF file %User Temp%\ offer.exe - detected as TROJ_PROTUX.BB (Note: %User Temp% is
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were
However, as of this writing, the said sites are inaccessible. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details However, as of this writing, the said sites are
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were
However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. It inserts an IFRAME
Other Details This Trojan does the following: This is Trend Micro's detection for scripts that contains a malicious Java Script code. The said Java Script calls other malicious scripts hosted in the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. As of this writing, the said sites are inaccessible. This is the Trend Micro detection for
Other Details Based on analysis of the codes, it has the following capabilities: This specially crafted PDF file contains an ebedded JavaScript that takes advantage of a vulnerability in Adobe