Keyword: JS_PETCH
4697 Total Search   |   Showing Results : 3161 - 3180
JS_CRYPTED.SMM accesses this malicious website to download files.
JS_REDIRECT.BB connects to this possibly malicious URL.
JS_PIDIEF.XF executes certain files from this site.
related to HTML_AGENTT.AMF.
When executed, TROJ_ADLOAD.YG connects to this malicious URL.
When executed, TROJ_ADLOAD.YG connects to this malicious URL.
When executed, TROJ_ADLOAD.YG connects to this malicious URL.
When executed, TROJ_ADLOAD.YG connects to this malicious URL.
When executed, TROJ_ADLOAD.YG connects to this malicious URL.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is a Trend Micro detection for a backdoor component exploiting a Java Runtime Environments (JRE) vulnerability. This backdoor may be downloaded by other malware/grayware from remote sites. It
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It also has rootkit capabilities, which enables it to
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry entries to enable its
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It adds registry entries to enable its automatic execution at every system startup. Arrival Details This Trojan may
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be
This backdoor may be hosted on a website and run when a user accesses the said website. It executes commands from a remote malicious user, effectively compromising the affected system. As of this
This backdoor acts as a proxy server that intercepts requests from certain Internet browsers and points them to the proxy server on port 63414. It monitors certain strings in the address bar of the
This Trojan may be hosted on a website and run when a user accesses the said website. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also