Keyword: JS_SMALL
6012 Total Search   |   Showing Results : 981 - 1000
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
execute its routine upon activation by the user: Upon execution of this malicious embedded JS file, it displays the following message box to trick the user: It does not have rootkit capabilities. It does
This Trojan Spy may be dropped by other malware. It attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
\ runas\command HKEY_CURRENT_USER\jS HKEY_CURRENT_USER\jS\DefaultIcon HKEY_CURRENT_USER\jS\shell HKEY_CURRENT_USER\jS\shell\ open HKEY_CURRENT_USER\jS\shell\ open\command HKEY_CURRENT_USER\jS\shell\ runas
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that contain
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/115201133550.jpeg News of Osama bin Laden’s death took the worldwide Web by storm, filling blogs and social networking sites like Facebook and
This malware connects to a site which redirects to a fake video streaming page. It also attempts to execute files, which are detected as JS_SPAMVIR.SMDA, on the user's browser. As a result, malicious
This Trojan may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It does not have any backdoor routine. It does not drop any other file.
{82369E3F-76FA-4DEE-AB48-B93F41A1E31C} %User Temp%\~zm_{82369E3F-76FA-4DEE-AB48-B93F41A1E31C}\css %User Temp%\~zm_{82369E3F-76FA-4DEE-AB48-B93F41A1E31C}\images %User Temp%\~zm_{82369E3F-76FA-4DEE-AB48-B93F41A1E31C}\js (Note: %User Temp%
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain malicious IFRAME tags. It redirects browsers to certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan executes when a user accesses certain websites where it is hosted. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan executes when a user accesses