Keyword: js
4700 Total Search   |   Showing Results : 181 - 200
activation by the user: Upon execution of this malicious embedded JS file, it displays the following message box to trick the user: It does not have rootkit capabilities. It does not exploit any vulnerability.
Google Chrome JS Execution Use-After-Free Vulnerability 1009593 - Microsoft Internet Explorer DLL Loading Arbitrary Code Execution Vulnerability Over WebDav (CVE-2011-0038) 1009591 - Microsoft Office
%AppDataLocal%\Google\Chrome\User Data\Default\Extensions\aaaaggphaebghfengepdepbkegaggggh\51.1_0\config\skin\widgets\SPE-options\js\options.js %AppDataLocal%\Google\Chrome\User Data\Default\Extensions
asm asp aspx avi awk bas bat bmp c cs cls clw cmd cpp csproj css ctl cxx def dep dlg dsp dsw eps f f77 f90 f95 fla flac frm gif h hpp hta htm html hxx ico idl inc ini inl java jpeg jpg js la mak
name Other Details This Trojan encrypts files with the following extensions: wb2 psd p7c p7b p12 pfx pem crt cer der pl py lua css js asp php incpas asm hpp h cpp c 7z zip rar drf blend apj 3ds dwg sda
execute its routine upon activation by the user: Upon execution of this malicious embedded JS file, it displays the following message box to trick the user: It does not have rootkit capabilities. It does
execute its routine upon activation by the user: Upon execution of this malicious embedded JS file, it displays the following message box to trick the user: It does not have rootkit capabilities. It does
xlsb xlsm xlt xltm xltx xlw xml asp bat brd c cmd dch dip jar js rb sch sh vbs 3g2 fla m4u swf bmp cgm djv gif nef png db dbf frm ibd ldf myd myi onenotec2 sqlite3 sqlitedb paq tbk tgz 3dm asc lay lay6
indd inf iso jar java jfif jge jpe jpeg jpg js json jsp k25 kdc key ldf lit localstorage m3u m4a m4v max mdb mdf mef mkv mobi mov movie mp1 mp2 mp3 mp4 mp4v mpa mpe mpeg mpg mpv2 mrw msg mts mui myi nef
\view\static\js %All Users Profile%\Telamon Cleaner %All Users Profile%\Telamon Cleaner\printsupport %All Users Profile%\Telamon Cleaner\view %All Users Profile%\Telamon Cleaner\translations
json xml csv db sql dbf mdb iso html htm xhtml php asp aspx js jsp css c cpp cxx h hpp hxx cs java class jar war ps1 bat vb awk sh cgi pl ada swift go py pyc bf coffee zip tar tgz bz2 7z rar bak It
%User Temp%\4d7YlHl4V5\theme\css %User Temp%\4d7YlHl4V5\theme\html %User Temp%\4d7YlHl4V5\theme\images %User Temp%\4d7YlHl4V5\theme\js %User Temp%\4d7YlHl4V5\theme\software %User Temp%\4d7YlHl4V5\theme
%User Temp%\{random folder name}\theme\css %User Temp%\{random folder name}\theme\html %User Temp%\{random folder name}\theme\images %User Temp%\{random folder name}\theme\js %User Temp%\{random folder
\index.template %User Temp%\mediaget-installer-tmp\install.template %User Temp%\mediaget-installer-tmp\install-min.template %User Temp%\mediaget-installer-tmp\js\jquery.min.1.6.4.js %User Temp%
dazip db0 dba dbf dcr der desc dmp dng doc docm docx dwg dxg epk eps erf esm ff flv forge fos fpk fpt fsh gdb gho hkdb hkx hplg hvpl ibank icxs indd itdb itl itm iwd iwi jpe jpeg jpg js kdb kdc kf layout
itdb itl itm iwd iwi jfif jpe jpeg jpg js kdb kdc kf layout lbf litemod lrf ltx lvl m2 m3u m4a map mcgame mcmeta mdb mdbackup mddata mdf mef menu mht mlx mov mp4 mpg mpp mpqge mrw mrwref msg ncf nef nrw
Profile%\CryptnetUrlCache\MetaData %User Profile%\Microsoft\CryptnetUrlCache %User Profile%\CryptnetUrlCache\Content %User Temp%\mediaget-installer-tmp\img %User Temp%\mediaget-installer-tmp\js (Note: %User
sav bkp bak tmp cfg conf ini prf html php js c cc py lua go java It avoids encrypting files found in the following folders: ProgramData Windows bootmgr $WINDOWS.~BT Windows.old Temp tmp Program Files
icxs idl ifo indd inf inf_loc ini itdb itl itm iwd iwi jfif jpe jpeg jpg js kdb kdc kf layout lbf lck lib litemod lnk log log1 log2 lrf ltx lvl m2 m3u m4a man manifest map mcgame mcmeta mdb mdbackup
erbsql erf exf fdb fff fh fhd fpx fxg gray grey gry h hpp ibd ibz idx iiq incpas jpeg jpg js kc2 kdbx kdc kpdx lua mdb mdc mef mfw mos mrw myd ndd nef nop nrw ns2 ns3 ns4 nsd nsf nsg nsh nwb nx1 nx2 nyf