Keyword: JS_AGENT
14722 Total Search   |   Showing Results : 3101 - 3120
This Trojan Spy may be downloaded by other malware/grayware from remote sites. It connects to certain websites to send and receive information. It deletes the initially executed copy of itself.
embedded malicious JS file. JS/Kryptik.BHP!tr (Fortinet)
This Ransomware may be downloaded by other malware/grayware from remote sites. It connects to certain websites to send and receive information. It encrypts files with specific file extensions. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
Trend Micro detection for: Microsoft Word documents that have an embedded malicious JS file. TrojanDownloader:JS/Nemucod (Microsoft)
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival Details
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself in all removable and
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Coinminer arrives on a system as
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Coinminer may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Coinminer may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Coinminer may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Hacking Tool may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
Trend Micro detection for: Microsoft Word documents that has an embedded malicious JS file. TrojanDownloader:JS/Swabfex.P (Microsoft); Trojan.Mdropper (Symantec)