Keyword: JS_PETCH
4697 Total Search   |   Showing Results : 2701 - 2720
This Trojan executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites
Other Details Based on analysis of the codes, it has the following capabilities: Upon execution, it accesses the URL http://{BLOCKED}e.net/.go/check.html . The said URL may redirect to the following
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a
This Trojan may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for files that
This Trojan redirects browsers to certain sites. Other Details This Trojan redirects browsers to the following sites: http://{BLOCKED}ifeasia.com/index3.html
However, as of this writing, the said sites are inaccessible. Arrival Details However, as of this writing, the said sites are inaccessible. Download Routine This Trojan takes advantage of the
However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. It inserts an IFRAME
Once a malware successfully exploits the said vulnerability, it causes certain actions to be done on the system. As of this writing, the said sites are inaccessible. This Trojan may be unknowingly
Installation This Trojan drops and executes the following files: %User Temp%\ {malware name}.pdf - non-malicious .PDF file %User Temp%\ offer.exe - detected as TROJ_PROTUX.BB (Note: %User Temp% is
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were
However, as of this writing, the said sites are inaccessible. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details However, as of this writing, the said sites are
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were
However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. It inserts an IFRAME
Other Details This Trojan does the following: This is Trend Micro's detection for scripts that contains a malicious Java Script code. The said Java Script calls other malicious scripts hosted in the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. As of this writing, the said sites are inaccessible. This is the Trend Micro detection for
Other Details Based on analysis of the codes, it has the following capabilities: This specially crafted PDF file contains an ebedded JavaScript that takes advantage of a vulnerability in Adobe
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. Arrival Details This Trojan may be dropped by other malware. It arrives as a component
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This unknown arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This unknown arrives as an attachment to email messages spammed by other