Keyword: js
4700 Total Search   |   Showing Results : 101 - 120
\YouWoBox\skins\yxphonegame %Application Data%\YouWoBox\advertisement %Program Files%\YouWoBox\Cache\box_new\js %Program Files%\YouWoBox\Cache\box_new\layer-v2.1\layer\skin\default %User Profile%\AppData F:
has an embedded malicious JS file.
embedded malicious JS file.
embedded malicious JS file.
has an embedded malicious JS file.
embedded malicious JS file.
embedded malicious JS file.
embedded malicious JS file.
embedded malicious JS file.
embedded malicious JS file.
embedded malicious JS file. JS/Kryptik.BHP!tr (Fortinet)
executes the JS file rvtcrextrexter_Num_68815.doc . Spammed via email
Root%\dnf %System Root%\lq %System Root%\mone %System Root%\mxd %System Root%\wow %System Root%\js %System Root%\dn %System Root%\rh (Note: %System Root% is the root folder, which is usually C:\. It is
embedded malicious JS file. VBA/TrojanDropper.Agent.VK (ESET-NOD32); TrojanDownloader:JS/Nemucod (Microsoft)
embedded malicious JS file. TrojanDownloader:JS/Nemucod!rfn (Microsoft); JS/Nemucod.tn (McAfee)
embedded malicious JS file. TrojanDownloader:JS/Nemucod!rfn (Microsoft); Trojan.Mdropper (Symantec)
Base64-encoded JS file attachment. TrojanDownloader:JS/Nemucod!rfn (Microsoft); JS/DwnLdr-UEN (Sophos Lite)
embedded malicious JS file. TrojanDownloader:JS/Swabfex.P (Microsoft); Trojan.Mdropper (Norton); JS/TrojanDownloader.Agent.QIZ trojan (NOD32)
Temp%\mediaget-installer-tmp\img %User Temp%\mediaget-installer-tmp\js (Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name}\Local Settings\Temp on
following folders: %User Temp%\Folder_Data_RC_ADDS\adds %User Temp%\Folder_Data_RC_ADDS\xml %Program Files%\Microsoft Data %User Temp%\Folder_Data_RC_ADDS\js %User Temp%\Folder_Data_RC_ADDS (Note: %User Temp%