Keyword: JS_JSSHELL
4704 Total Search   |   Showing Results : 3161 - 3180
JS_AGENT.SMJ sends the stolen email messages to this URL.
JS_AGENT.SMJ posts counts of emails read in this URL.
JS_AGENT.SMJ uploads the stolen email contact list of the affected users in this URL.
JS_AGENT.SMJ accesses this URL to download other files onto the affected system.
JS_SCRSCR.LOL contains a script that has a reference to this malicious URL.
JS_EXPLOIT.HBA connects to this site to download files.
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
JS_CRYPTED.SMM accesses this malicious website to download files.
JS_REDIRECT.BB connects to this possibly malicious URL.
This is a Trend Micro detection for a backdoor component exploiting a Java Runtime Environments (JRE) vulnerability. This backdoor may be downloaded by other malware/grayware from remote sites. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It adds registry entries to enable its automatic execution at every system startup. Arrival Details This Trojan may
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It also has rootkit capabilities, which enables it to
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry entries to enable its