Search
Keyword: JS_ADODB
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It sends the information it gathers to remote sites.
\1522ef138ba104249c3934a80811f825\img %User Temp%\DLG\ui\common\progress\img %User Temp%\DLG\ui\offers\1522ef138ba104249c3934a80811f825\js %User Temp%\DLG\ui\offers\d1218f43853f973f710cba676ef66845\css %User Temp%\DLG\ui\offers
{1B1276C1-4557-4B55-BC87-4C1A3CFA0D30} %User Temp%\~zm_{1B1276C1-4557-4B55-BC87-4C1A3CFA0D30}\css %User Temp%\~zm_{1B1276C1-4557-4B55-BC87-4C1A3CFA0D30}\images %User Temp%\~zm_{1B1276C1-4557-4B55-BC87-4C1A3CFA0D30}\js %User Temp%\~zm_
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager,
{CB54CEB2-E9F4-48F1-BD02-D4577529646F} %User Temp%\~zm_{CB54CEB2-E9F4-48F1-BD02-D4577529646F}\css %User Temp%\~zm_{CB54CEB2-E9F4-48F1-BD02-D4577529646F}\images %User Temp%\~zm_{CB54CEB2-E9F4-48F1-BD02-D4577529646F}\js %User Temp%\~zm_
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This spyware is injected into all running processes to remain memory resident. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
{A7CAD04F-BF4A-4A07-B95E-95002AC53B7F} %User Temp%\~zm_{A7CAD04F-BF4A-4A07-B95E-95002AC53B7F}\css %User Temp%\~zm_{A7CAD04F-BF4A-4A07-B95E-95002AC53B7F}\images %User Temp%\~zm_{A7CAD04F-BF4A-4A07-B95E-95002AC53B7F}\js %User Temp%\~zm_
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that contain
This File infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This File infector arrives on a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Trojan modifies registry entries to disable various system services. This action prevents most of the system functions to be used. It does not have any propagation routine. It does not have any
Temp%\{Random characters}\js\contents.js %User Temp%\{Random characters}\js\external-dev.js %User Temp%\{Random characters}\js\external.js %User Temp%\{Random characters}\js\installparams.js %User Temp%\
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
\icons %User Temp%\~zm_{D34034DD-CB99-4890-AA88-98D890B1D5D8}\js %User Temp%\~zm_{D34034DD-CB99-4890-AA88-98D890B1D5D8}\js\bramus %User Temp%\~zm_{D34034DD-CB99-4890-AA88-98D890B1D5D8}\js\prototype (Note: