Search
Keyword: JS_AGENT
Software\Foxit Reader\Start\en-US\js\banner.js %Program Files%\Foxit Software\Foxit Reader\Start\en-US\js\jquery-1.9.1.min.js %Program Files%\Foxit Software\Foxit Reader\Start\en-US\js\nor.js %Program Files%
\qs_6c1829d0\dialogs %User Temp%\qs_6c1829d0\dialogs\library %User Temp%\qs_6c1829d0\dialogs\library\css %User Temp%\qs_6c1829d0\dialogs\library\images %User Temp%\qs_6c1829d0\dialogs\library\js %User Temp%
\ephdpnpjnldjojklnkgcgladikdfomcb\1.0.0_0 1\Extensions\ephdpnpjnldjojklnkgcgladikdfomcb\1.0.0_0\img 1\Extensions\odociggmedpfmeocpghedjmilfdicmgl\1.0.0_0\res\css 1\Extensions\odociggmedpfmeocpghedjmilfdicmgl\1.0.0_0\res\js 1
\DOCUME~1\Wilbert %User Profile%\LOCALS~1 %User Temp%\RarSFX0 fwzs fwzs\Bin fwzs\Bin\download fwzs\Bin\UI fwzs\Bin\UI\JS fwzs\Bin\UI\Style fwzs\Bin\UI\Style\Css fwzs\Bin\UI\Style\Images %User Temp%\RarSFX0
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan is a part of a Java applet that exploits a Java Runtime Environment (JRE) vulnerability. It uses an HTML file to download and execute a backdoor. To get a one-glance comprehensive view of
This malware exploits a vulnerability in Java Runtime Environment to allow a remote user to execute arbitrary commands. It connects to a certain URL to communicate with its remote server. This Trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This malicious HTML file contains a JavaScript that redirects the user to certain malicious sites. Arrival Details This Trojan may be downloaded from the following remote sites: http://{BLOCKED
This Trojan may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It does not have any backdoor routine. It does not drop any other file.