Keyword: JS_JSSHELL
4705 Total Search   |   Showing Results : 4381 - 4400
This malware is a variant of malware family CERBER discovered late November 2016, and has been found to be sporting routines that seek out database processes in the affected system. This is believed
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
html js backup dat data sql msg css odb odt odm odc wps rtf ai sav raw old r3d mdb dng 3fr nef jpe accdb srw db pdb dbf tex pages pps key sdf xml mpa mid m3u 3gp 3g2 mpg 3ds 3dm eps ps svg zi px cs fla
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: JS_NEMUCOD If your Trend Micro
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain malicious IFRAME tags. However, as of this writing, the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
dbf dcr dcu dds default der dfm directory disc dmg dng doc docm docx dtd dvd dwg dxf eip emf eml eps epub erf fff flv frm gfx gif gzip h htm html idl iiq indd inf iso jar java jfif jge jpe jpeg jpg js
iv2i iwd iwi jac jar jav java jbc jc jfif jge jgz jif jiff jnt jpc jpe jpeg jpf jpg jpw jrc jrs js json jsp just k25 kc2 kdb kdbx kdc kde key kf klq kmz kod kom kpdx ksb ksb2 kwd kwm l laccdb lastlogin
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This hacking tool may be manually installed by a user. It uses a user interface (UI). Arrival Details This hacking tool may be manually installed by a user. Installation This hacking tool drops the
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from