Keyword: JS_PSYME
4709 Total Search   |   Showing Results : 3161 - 3180
This is related to the detection JS_FBJACK.C , which spreads via Facebook chat and leverages Osama bin Laden's death.�
JS_AGENT.SMJ is downloaded onto the affected system from this URL when a user previews a specially crafted email.
JS_AGENT.SMJ sends the stolen email messages to this URL.
JS_AGENT.SMJ posts counts of emails read in this URL.
JS_AGENT.SMJ uploads the stolen email contact list of the affected users in this URL.
JS_AGENT.SMJ accesses this URL to download other files onto the affected system.
JS_SCRSCR.LOL contains a script that has a reference to this malicious URL.
JS_EXPLOIT.HBA connects to this site to download files.
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
JS_CRYPTED.SMM accesses this malicious website to download files.
JS_REDIRECT.BB connects to this possibly malicious URL.
JS_PIDIEF.XF executes certain files from this site.
related to HTML_AGENTT.AMF.
When executed, TROJ_ADLOAD.YG connects to this malicious URL.
When executed, TROJ_ADLOAD.YG connects to this malicious URL.