Keyword: JS_Generic
34316 Total Search   |   Showing Results : 1901 - 1920
This Trojan may be hosted on a website and run when a user accesses the said website. Once a compromised site is visited, the user is redirected to a certain malicious site. Arrival Details This
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were
This malware is a JavaScript component of the Blackhole Exploit kit. It is responsible for searching vulnerable software on the user's machine in order to deploy specific exploits and ultimately,
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. It inserts an
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This Trojan may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This Trojan
This malware spreads via <i>Facebook</i>. It uses the news of Osama bin Laden's death, making it enticing for users. To get a one-glance comprehensive view of the behavior
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
BANLOAD malware variants arrive on the systems as files dropped by other malware or as files downloaded unknowingly by users when visiting malicious sites. When executed, these connect to malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. It inserts an
This Trojan executes when a user accesses certain websites where it is hosted. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected
This is Trend Micro's detection for malicious HTML files that contain a script that may redirect to another URL to download and execute another JavaScript. This Trojan may be hosted on a website and