Keyword: js_noclose.e
25768 Total Search   |   Showing Results : 1301 - 1320
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
Trend Micro has received multiple samples of this JavaScript (JS) malware from multiple, independent sources, including customer reports and internal sources. These indicate that this script poses a
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be downloaded from
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It may be
\1522ef138ba104249c3934a80811f825\img %User Temp%\DLG\ui\common\progress\img %User Temp%\DLG\ui\offers\1522ef138ba104249c3934a80811f825\js %User Temp%\DLG\ui\offers\d1218f43853f973f710cba676ef66845\css %User Temp%\DLG\ui\offers
\FlashTopia\js %System Root%\Google %System Root%\Google\Chrome %System Root%\Google\Chrome\User Data %System Root%\Google\Chrome\User Data\Profile 1 %System Root%\Google\Chrome\User Data\Profile 2 %System Root
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It sends the information it gathers to remote sites.
\DLG\ui\offers\d1218f43853f973f710cba676ef66845\js %User Temp%\DLG\ui\common\base\css %User Temp%\DLG\ui\common\base\js %User Temp%\DLG\ui\offers\1522ef138ba104249c3934a80811f825\css %User Temp%\DLG\ui
This Trojan modifies registry entries to disable various system services. This action prevents most of the system functions to be used. It does not have any propagation routine. It does not have any
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager,
Temp%\{Random characters}\js\contents.js %User Temp%\{Random characters}\js\external-dev.js %User Temp%\{Random characters}\js\external.js %User Temp%\{Random characters}\js\installparams.js %User Temp%\
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\icons %User Temp%\~zm_{D34034DD-CB99-4890-AA88-98D890B1D5D8}\js %User Temp%\~zm_{D34034DD-CB99-4890-AA88-98D890B1D5D8}\js\bramus %User Temp%\~zm_{D34034DD-CB99-4890-AA88-98D890B1D5D8}\js\prototype (Note:
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
\DOCUME~1 %System Root%\DOCUME~1\Wilbert %User Profile%\LOCALS~1 %User Temp%\installer\gui %User Temp%\installer\gui\ib %User Temp%\installer\gui\conditions %User Temp%\installer\gui\js %User Temp%\installer
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This