Keyword: JS_ADODB
4706 Total Search   |   Showing Results : 3181 - 3200
When executed, TROJ_ADLOAD.YG connects to this malicious URL.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is a Trend Micro detection for a backdoor component exploiting a Java Runtime Environments (JRE) vulnerability. This backdoor may be downloaded by other malware/grayware from remote sites. It
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It also has rootkit capabilities, which enables it to
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry entries to enable its
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It adds registry entries to enable its automatic execution at every system startup. Arrival Details This Trojan may
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be
This backdoor may be hosted on a website and run when a user accesses the said website. It executes commands from a remote malicious user, effectively compromising the affected system. As of this
This backdoor acts as a proxy server that intercepts requests from certain Internet browsers and points them to the proxy server on port 63414. It monitors certain strings in the address bar of the
This Trojan may be hosted on a website and run when a user accesses the said website. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It connects to a website to send and receive information. Arrival Details This backdoor
This Trojan may be downloaded by other malware/grayware from remote sites. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes when a user accesses certain websites where it is hosted.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan takes advantage of a vulnerability in a certain software to drop malicious files. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by