Search
Keyword: JS_AGENT
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It does not have
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
%Program Files%\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\de-de\ui-strings.js %Program Files%\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
{BLOCKED}t.com/360safe.html Other Details This Trojan does the following: Checks the User Agent of the affected system. If the user agent is msie 7 , it loads the possibly malicious page 361.html (detected
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This spyware may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This adware may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It gathers certain information on the affected computer. It connects to
This Trojan arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
\Rar.exe" a -y -ep -inul -k -m0 -hp"{%.FS\sgs5@B{S8pd8@vfuS,)ax-=Tog" "%AppDataLocal%\Google\Chrome\User Data\Default\Extensions\efaidnbmnnnibpcajpcglclefindmkaj\15.1.1.0_0\data\js\44 \xd0\xa4\xd0\xb0\xd0
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malicious script is noteworthy due to its use in what looks like a targeted attack via Webmail. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
\zx_13283b3780\dialogs %User Temp%\zx_13283b3780\dialogs\library %User Temp%\zx_13283b3780\dialogs\library\css %User Temp%\zx_13283b3780\dialogs\library\images %User Temp%\zx_13283b3780\dialogs\library\js %User
\qs_6312633e0\dialogs %User Temp%\qs_6312633e0\dialogs\library %User Temp%\qs_6312633e0\dialogs\library\css %User Temp%\qs_6312633e0\dialogs\library\images %User Temp%\qs_6312633e0\dialogs\library\js %User Temp%