Keyword: JS_PETCH
4697 Total Search   |   Showing Results : 2881 - 2900
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any
This Coinminer may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Coinminer may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Coinminer may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Hacking Tool may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
Trend Micro detection for: Microsoft Word documents that has an embedded malicious JS file. TrojanDownloader:JS/Swabfex.P (Microsoft); Trojan.Mdropper (Symantec)
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
Trend Micro detection for: Microsoft Word documents that have an embedded malicious JS file. TrojanDownloader:JS/Nemucod (Microsoft); Trojan-Downloader.MSWord.Agent.blu (Kaspersky)
This Hacking Tool may be hosted on a website and run when a user accesses the said website. It requires being executed with a specific argument/parameter, an additional component, or in a specific
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
Trend Micro detection for: Microsoft Word documents that has an embedded malicious JS file. TrojanDownloader:JS/Nemucod!rfn (Microsoft); W97M.Downloader (Symantec)
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive