Search
Keyword: JS_JSSHELL
\ runas\command HKEY_CURRENT_USER\jS HKEY_CURRENT_USER\jS\DefaultIcon HKEY_CURRENT_USER\jS\shell HKEY_CURRENT_USER\jS\shell\ open HKEY_CURRENT_USER\jS\shell\ open\command HKEY_CURRENT_USER\jS\shell\ runas
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that contain
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of certain vulnerabilities. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/115201133550.jpeg News of Osama bin Laden’s death took the worldwide Web by storm, filling blogs and social networking sites like Facebook and
This malware connects to a site which redirects to a fake video streaming page. It also attempts to execute files, which are detected as JS_SPAMVIR.SMDA, on the user's browser. As a result, malicious
This Trojan may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It does not have any backdoor routine. It does not drop any other file.
{82369E3F-76FA-4DEE-AB48-B93F41A1E31C} %User Temp%\~zm_{82369E3F-76FA-4DEE-AB48-B93F41A1E31C}\css %User Temp%\~zm_{82369E3F-76FA-4DEE-AB48-B93F41A1E31C}\images %User Temp%\~zm_{82369E3F-76FA-4DEE-AB48-B93F41A1E31C}\js (Note: %User Temp%
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain malicious IFRAME tags. It redirects browsers to certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan executes when a user accesses certain websites where it is hosted. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan executes when a user accesses
This Trojan executes when a user accesses certain websites where it is hosted. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. It
{8D121F0E-DD71-419D-B363-B008D4BE8476} %User Temp%\~zm_{8D121F0E-DD71-419D-B363-B008D4BE8476}\css %User Temp%\~zm_{8D121F0E-DD71-419D-B363-B008D4BE8476}\images %User Temp%\~zm_{8D121F0E-DD71-419D-B363-B008D4BE8476}\js (Note: %User Temp%
{39285E50-72B9-4EBA-BB36-4204B4438777} %User Temp%\~zm_{39285E50-72B9-4EBA-BB36-4204B4438777}\css %User Temp%\~zm_{39285E50-72B9-4EBA-BB36-4204B4438777}\images %User Temp%\~zm_{39285E50-72B9-4EBA-BB36-4204B4438777}\js (Note: %User Temp%