TrojanDownloader:Win32/Banload.ADP
TrojanProxy:Win32/Banker.O
TrojanProxy:Win32/Banker.O is a trojan that downloads a malicious JScript file. The downloaded file, detected as TrojanProxy:JS/Banker.N, redirects your browser traffic through an attacker-controlled proxy server.
TrojanSpy:Win32/Bancos.AFY!cfg
TrojanSpy:Win32/Bancos.AFY!cfg is a malicious JScript proxy auto-config file that may redirect the user's browser traffic through an attacker-controlled proxy server.
Trojan:JS/Certor.A
Microsoft Defender Antivirus detects and removes this threat.
This threat doesn’t have the typical ‘execute-a-binary-malware-payload-at-the-end-and-then-done’ routine that we often see. We have observed this threat being distributed as a malicious attachment to spam email.
TrojanDropper:Win32/Banker.J
TrojanDropper:Win32/Banker.J is a trojan that drops a malicious JScript file, detected as TrojanProxy:JS/Banker.N, that may redirect your browser traffic through an attacker-controlled proxy server.
JS/Kak
Trojan:JS/Redirector.GU
Trojan:JS/Redirector.GU is the detection for an obfuscated JavaScript that attempts to redirect the browser to the webpage "counterstats.servemp3.com/ml.php".
Trojan:JS/Nimda.A
TrojanSpy:Win32/Banker.AEJ!cfg
TrojanSpy:Win32/Banker.AEJ!cfg is a malicious JScript proxy auto-configuration file that may redirect the user's browser traffic through an attacker-controlled proxy server.
Exploit:JS/Mult.DK
Exploit:JS/Mult.DK is a detection for malicious JavaScript which attempts to exploit a vulnerability in Adobe Reader via the user's web browser.
Trojan:JS/Redirector.GZ
Trojan:JS/Redirector.GZ is a generic detection for specific JavaScript that attempts to redirect the affected user's browser to another website. This JavaScript is usually embedded in a malicious or compromised webpage.
Trojan:Win32/Lioris.A
TrojanProxy:JS/Banker.N
TrojanProxy:JS/Banker.N is a malicious JScript proxy configuration file that may redirect your browser traffic through an attacker-controlled proxy server.
Exploit:JS/Anogre.E
Windows Defender detects and removes this threat.
This threat is associated with an exploit kit called SweetOrange. It can exploit vulnerabilities in Java, specifically the vulnerability discussed in CVE-2013-0422.
Win32/Powessere
Windows Defender detects and removes this threat.
This malware family steals information about your PC, sends it a malicious hacker, and downloads other malware.
It can be installed on your PC by other malware, or as a result of an exploit, such as Exploit:Win32/CVE-2012-0158.CJ.
TrojanSpy:Win32/Bradop.E
Windows Defender detects and removes this threat.
This threat can collect your sensitive information and send it to a malicious hacker.
HTML/NeutrinoEK
Windows Defender detects and removes this threat.
This threat family uses vulnerabilities in recent versions of Internet Explorer, Microsoft Silverlight, Adobe Flash Player, and Java to install malware on your PC. We have seen it try to install Ransom:Win32/Exxroute, Ransom:Win32/Cerber, and drop variants of Win32/Gamarue.
You might get this threat if you visit a malicious or hacked website, or click a malicious link in an email.