Keyword: JS_JSSHELL
4705 Total Search   |   Showing Results : 3641 - 3660
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This threat, dubbed as BitCrypt, is a ransomware that steals funds from various cryptocurrency wallets. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This worm drops copies of itself in the Windows Common Startup folder to enable its automatic execution at every system startup. It drops copies of itself into all the removable drives connected to
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Other Details This Trojan
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. As of this writing, the said sites are inaccessible. Arrival Details This
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: HTML_IFRAME VBS_PSYME JS_AGENT If
This Trojan executes when a user accesses certain websites where it is hosted. This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a user visits an affected Web page,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
Trend Micro detection for: Microsoft Word documents that has an embedded malicious JS file.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It retrieves specific information from the affected
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It connects to
Trend Micro detection for: Microsoft Word documents that has an embedded malicious JS file.