Keyword: js
4700 Total Search   |   Showing Results : 121 - 140
Application creates the following folders: %User Temp%\mediaget-installer-tmp %User Temp%\mediaget-installer-tmp\js %User Temp%\mediaget-installer-tmp\img (Note: %User Temp% is the current user's Temp folder,
{randomstring}={randomnumbers} Early waves of the attack were observed on August 16 and were seen to use FTP links as shown below: Upon clicking the link, it will download a VBS or a JS file, which is the actual
folders: %System Root%\dnf\ %System Root%\lq\ %System Root%\mone\ %System Root%\mxd\ %System Root%\wow\ %System Root%\js\ %System Root%\dn\ %System Root%\rh\ %System Root%\lqyxz\ %System Root%\zq\ (Note:
Temp%\installer\gui\ib\main_old.css %User Temp%\installer\gui\conditions\conditions.js %User Temp%\installer\gui\js\config.js %User Temp%\installer\gui\events\events.js %User Temp%\installer\gui\js
malicious JS file detected as JS_NEMUCOD.ELDSAUEL . Spammed via email Connects to URLs/IPs
{variable1} where {variable1} can be any of the following: html htm jpeg png jpg gif js a variant of SWF/Exploit.Agent.HQ (ESET), Script.SWF.C362 (F-Secure)
\Rar.exe" a -y -ep -inul -k -m0 -hp"{%.FS\sgs5@B{S8pd8@vfuS,)ax-=Tog" "%AppDataLocal%\Google\Chrome\User Data\Default\Extensions\efaidnbmnnnibpcajpcglclefindmkaj\15.1.1.0_0\data\js\44 \xd0\xa4\xd0\xb0\xd0
Temp%\installer\gui\ib\main_old.css %User Temp%\installer\gui\conditions\conditions.js %User Temp%\installer\gui\js\config.js %User Temp%\installer\gui\events\events.js %User Temp%\installer\gui\js
Trend Micro detection for: Malicious Base64-encoded JS file attachment.
extension}x - JS script detected as Worm.JS.NEMUCOD.WEALSW It adds the following processes: WScript /e:JScript "{Malware Path}\{Malware Name and Extension}x" Downloaded from the Internet, Dropped by other
Numbers}\sqlite3.dll %User Temp%\sfx{Random Numbers}\web\js\app.js %User Temp%\sfx{Random Numbers}\web\js\vendor.js %User Temp%\sfx{Random Numbers}\web\js\formcontrols.min.js %User Temp%\sfx{Random Numbers}
Trend Micro detection for: Microsoft Word documents that has an embedded malicious JS file.
the Trend Micro detection for: Microsoft Word documents that has embedded malicious JS files detected as: JS_NEMUCOD.AUEP
Trend Micro detection for: Microsoft Word documents that has an embedded malicious JS file.
Trend Micro detection for: Microsoft Word documents that has an embedded malicious JS file.
Trend Micro detection for: Microsoft Word documents that has an embedded malicious JS file.
Trend Micro detection for: Microsoft Word documents that has an embedded malicious JS file.
Trend Micro detection for: Microsoft Word documents that has an embedded malicious JS file.
the Trend Micro detection for: Microsoft Word documents that has an embedded malicious JS file. TrojanDownloader:PowerShell/Maedenes.A (Microsoft)
the Trend Micro detection for: Microsoft Word documents that has embedded malicious JS files detected as: JS_DLOADR.YYSSA