Numerous notifications js:Agent-Enc[tr]

Hello, i am working with an online site:https:paroisse-mamers.fr and recently we have numerous detections and annotations like these ones: js:Agent-Enc[tr] but it’s impossible to make screen capture of this notification…

When we worked for the same data with a local server xampp there are no problems and all is working well.

i had to reduce the protections of this pc : désactivating web secured navigation in order to have something working well on the on line site.

Perhaps it’s a matter of js scripts which may be could be too ancient? I don’t know…or it’s a false-positive notification…

i am waiting for your answers and advices in order to solve this problem.

Thank you in advance for your answers.

jeanluc.ferre


954e3ddf6c27/2026-02-20T18:15:47.950Z
08d70d30eec1/2026-02-20T18:15:50.987Z
07f8954cc5d3/2026-02-20T18:15:53.148Z

======================================

==================================

Norton Private Browser

====================================

Submit a file or URL to Norton for review here

Note: after submitting dispute and waiting 48 business hours with no change.
Please contact Norton support and advise support that you’ve submitted dispute and waited 48 business hours. My understanding is…once you state that you have already submitted False Positive over the submission portal and waited 48 business hours…support agent shall take the URL and detection screenshot and advance the case.

Contact Chat Support and Norton Phone Number (related notes here)

=========================================

The detection JS:Agent-ENC [Trj] is a generic classification used by Norton 360 to identify potentially malicious JavaScript files.

In the context of the site paroisse-mamers.fr, this alert specifically refers to a Trojan horse hidden in a script, often designed to circumvent security blockers or perform unauthorized actions like data harvesting or site redirection.

What “JS:Agent-ENC [Trj]” Means

  • JS/Agent: Indicates a JavaScript-based Trojan, a type of malware that typically infiltrates systems when a user visits a compromised website.
  • ENC: Stands for Encoded or Encrypted. This suggests the malicious code is obfuscated to hide its true purpose from traditional security scanners.
  • [Trj]: Short for Trojan, a program that appears legitimate but performs malicious activities once executed.

Why This Detection Occurs

  1. Compromised Website: Legitimate sites (like a parish page) can be hacked, and malicious scripts can be injected into their existing code without the owner’s knowledge.
  2. False Positive: Generic detections like this are prone to “false positives,” where Norton’s AI incorrectly flags benign, obfuscated scripts (such as those used for tracking or specialized web features) as threats.
  3. Drive-by Download: The script may be attempting to silently drop files onto your device during your visit.

Recommended Actions

  • Do Not Bypass: Unless you are absolutely certain the detection is an error, follow Norton’s recommendation and avoid visiting the site while the alert is active.
  • Submit a Dispute: If you believe the site is safe, you can report a false positive through the Norton Submissions Portal for review.
  • Run a Full Scan: If you have already visited the site, open Norton 360 and perform a Full System Scan to ensure no malicious payload was dropped in your browser cache.

Note: AI sourced content may make mistakes

https://paroisse-mamers.fr
https://sitecheck.sucuri.net/results/https/paroisse-mamers.fr


https://labs.sucuri.net/signatures/sitecheck/malware.injection/

=======================================

https://www.virustotal.com/gui/url/ca6ae992fa5a6415b1f703989f96da026aa1cef5ea5971142705b4bcf349ab16

======================================

https://www.abuseipdb.com/check/46.105.57.169
We resolved the domain paroisse-mamers.fr to IP address 46.105.57.169
46.105.57.169 was found in our database!
IP Abuse Reports for 46.105.57.169:
This IP address has been reported a total of 39 times from 28 distinct sources. 46.105.57.169 was first reported on March 14th 2021, and the most recent report was 3 months ago.
Old Reports: The most recent abuse report for this IP address is from 3 months ago. It is possible that this IP is no longer involved in abusive activities.

Threat name: JS:Agent-ENC [Trj]
Threat type: Trojan Horse - This threat pretends to be something else (e.g., picture, document, or other file) to trick you into running it and infecting your computer.
Status: Moved to Quarantine
Options: Report false detection
Detected by: Auto-Protect
On PC from: 2/20/26, 1:33 PM
Last Used: 2/20/26, 1:33 PM
Startup Item: No

Unknown
It is unknown how many users in the Norton Community have used this file.
Unknown
The file release is currently unknown
High
The file risk is high
Activity
Path | Type | Status
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sessions\Session_13416086004380862 | File | Repaired

========================================

JS:Agent-ENC [Trj] is a generic detection for a malicious JavaScript file disguised as a legitimate document or media file to trick users into executing it. Because “JS:Agent” is a broad classification, its behavior can range from simple browser redirections to serious data theft.

Key Characteristics & Risks

  • Disguise Tactics: It often arrives as an email attachment (e.g., a fake invoice or bank statement) or via “drive-by downloads” from compromised websites.
  • Malicious Actions: Once active, it can steal browser credentials, monitor keystrokes, or act as a “downloader” to install more severe malware like ransomware or cryptocurrency miners.
  • Evasion: The -ENC suffix typically indicates that the script is encrypted or obfuscated to bypass basic security scanners.

Recommended Removal Steps
Disconnect from the Internet: Immediately cut your connection to stop the Trojan from communicating with its Command & Control (C2) server or exfiltrating your data.
Clean Your Browsers: Since this is JavaScript-based, it often resides in browser components.

  • Remove any unrecognized extensions or add-ons.
  • Clear your browser cache and cookies to remove temporary malicious scripts.
  • Use the Microsoft Edge Reset Tool or similar settings in other browsers if the threat persists.
    Run a Deep Scan:
  • Use Microsoft Defender Antivirus to run a Full Scan.
  • For deeply embedded threats, perform an Offline Scan which runs before Windows fully boots.
    Check Startup Programs: Use the Microsoft Autoruns tool to identify and delete suspicious entries that allow the malware to relaunch after a reboot.

=============================================

When Norton 360 flags JS:Agent-ENC [Trj], it has identified an encrypted (ENC) JavaScript-based Trojan designed to masquerade as a safe file. These often reside in browser caches or system temporary folders after visiting a compromised site.

Immediate Removal Actions
Check Norton Quarantine: Open Norton 360 > Security > Security History. Select Quarantine from the drop-down. If the threat is listed, Norton has already isolated it. It is recommended to delete quarantined items rather than restoring them.
Run Norton Power Eraser: For persistent threats, use the Norton Power Eraser tool. It uses aggressive scanning to detect “crimeware” that standard scans might miss.
Perform a Full System Scan: In the Norton main window, go to Security > Scans > Full System Scan. Ensure “Scan all archives” is enabled in the scan settings to find hidden scripts.
Clear Browser Data: Since this is a JavaScript threat, it may be stuck in your browser’s temporary storage. Clear your browser cache and cookies and remove any recently added, unrecognized extensions.

False Positive Potential
Sometimes Norton flags legitimate scripts (like those from Intel or media players) as a Trojan Horse - SNH-gen [Trj] due to their behavior. If the detected path is within a trusted application folder (e.g., C:\Program Files\Intel), it may be a false positive.

===========================================

That specific file path indicates the threat is located within
Chrome’s Session Storage. This means the malicious JavaScript wasn’t necessarily a file you “downloaded” manually, but rather a script from a website you currently or recently had open in a tab.

Norton is flagging the session data because Chrome “remembered” the malicious script so it could reload your tabs if the browser crashed.

How to Clear It
Since the threat is embedded in your active session, standard antivirus deletion might fail if Chrome is currently using that file.
Close Google Chrome completely.
Clear Browsing Data: Reopen Chrome and use the shortcut Ctrl+Shift+Del. Set the time range to “All time” and ensure “Cookies and other site data” and “Cached images and files” are checked. You can follow the Official Google Chrome Clear Cache guide.
Manual Deletion: If Norton still alerts you, navigate to C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sessions\ and delete everything inside that folder. This will wipe your open tabs, but it will kill the script’s hiding spot.
Check Extensions: Go to chrome://extensions/ and remove anything you didn’t personally install. Some malicious extensions can reinfect your sessions.

Is your PC safe?
As long as the detection stays within the ...\Google\Chrome\User Data\... folder, the threat is likely contained within the browser and hasn’t infected your Windows system files yet. Norton is doing its job by blocking it before it “breaks out” of the browser session.

====================================

Visiting https://www.paroisse-mamers.fr/ likely triggered the alert because the site appears to be compromised or is hosting a script that behaves like a downloader.

While the website is for a legitimate parish in France, it currently uses an insecure connection (http://) for many of its files, and several search results indicate it contains outdated content and unverified downloads (like old PDF bulletins). This makes it a prime target for “drive-by download” attacks, where a malicious script (like JS:Agent-ENC [Trj]) is silently injected into the site’s code.

Why the alert is in your “Sessions” folder
The JS:Agent-ENC [Trj] detection in your Chrome Sessions folder means the malicious script was loaded into your browser’s memory while you were viewing that site. Chrome then saved a “snapshot” of that active session to your hard drive so it could restore your tabs later. Norton’s real-time scanner caught the script as Chrome tried to write that snapshot to your disk.

How to resolve this immediately
Close Chrome: Do not just close the tab; exit the entire program to release the session files.
Delete the Session Files: Go to C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sessions\ and delete every file in that folder. This permanently removes the “memory” of the malicious script.
Clear Browser Cache: Follow the Google Chrome Clear Cache guide and select “All time” for “Cookies and other site data” and “Cached images and files.”
Run a Norton Full Scan: Since you can’t use Power Eraser, run a Norton 360 Full System Scan to ensure the script didn’t manage to drop any secondary files outside of the browser.

Avoid returning to that specific website until you are certain its security has been updated.
Did you download any PDF bulletins or click any links while you were on that parish website?

========================================

Note: AI sourced content may make mistakes
Note: Norton Power Eraser EOL
Norton Power Eraser (NPE) is officially reaching its End-of-Life (EOL) on April 30, 2026.
After this date, the tool will stop functioning and will no longer receive updates.

Norton 360 is flagging your live site for a JavaScript Trojan (JS:Agent-Enc) because it detects “encoded” or obfuscated code that resembles a malicious downloader or redirector.

Why you see it on the live site but not XAMPP:

  • Security Aggressiveness: Live web traffic is scanned by Norton’s Safe Web and Real-Time Threat Protection layers, which are more sensitive than the local file scans usually active on XAMPP.
  • Live Injection: It is possible your online server was compromised (e.g., via a vulnerable plugin) and a script was injected into your index.php or a .js file that does not exist in your local copy.
  • Obsolete Code: Older, minified, or custom-encoded scripts often look like “malware-enc” (encoded malware) to modern security engines because they cannot verify the script’s intent.

How to fix it:
Run a Remote Scan: Use Sucuri SiteCheck or VirusTotal on your URL. These tools can often pinpoint the exact line of code or external script causing the alert.
Inspect Your Files:* Look for scripts starting with eval(, atob(, or long strings of random numbers and letters (like _0x26d259). If these appear in your index or theme files and you didn’t put them there, your site may be infected.
Update Your Tech: If you are using “ancient” scripts, update them to the latest versions. Modern minification is less likely to trigger false positives than old obfuscation techniques.
Submit a False Positive Dispute: If you are certain the code is clean, you must report it to Norton via the Norton Submissions Portal to have the block removed for all users.

Have you recently added any new plugins or custom scripts to the live version of your site?

==========================

Submit a file or URL to Norton for review here

Note: after submitting dispute and waiting 48 business hours with no change.
Please contact Norton support and advise support that you’ve submitted dispute and waited 48 business hours. My understanding is…once you state that you have already submitted False Positive over the submission portal and waited 48 business hours…support agent shall take the URL and detection screenshot and advance the case.

Contact Chat Support and Norton Phone Number (related notes here)

===========================

Learn what to do with repeated Norton detections here

===========================

Note: AI sourced content may make mistakes

  • https://transparencyreport.google.com/safe-browsing/search
  • https://www.eset.com/us/home/link-checker/
  • https://nordvpn.com/link-checker/
  • https://www.bitdefender.com/en-us/consumer/link-checker
  • https://www.urlvoid.com/
  • https://sitecheck.sucuri.net/
  • https://safeweb.norton.com/
  • https://www.virustotal.com/gui/home/url

Hello,

Thank you for your answers…i am rather agree with your last notices…But the problem is that if i make a complete scan of the data of the content of the site, this last one doen’t work well after that. I tried it on a local server xampp; probably system files have also been put in quarantine.

recently we didn’t installed new plugin or scripts…we only update the content adding some pdf files or writings in articles. Therefore i noticed that the rule for writing pdf files names was quite strange with white spaces and capital letters. Perhaps that’s a thing that joomla and Norton don’t like.

Thank you for your contributions; waiting for new advices.

Jeanluc.ferre

Submit a file or URL to Norton for review here

Note: after submitting dispute and waiting 48 business hours with no change.
Please contact Norton support and advise support that you’ve submitted dispute and waited 48 business hours. My understanding is…once you state that you have already submitted False Positive over the submission portal and waited 48 business hours…support agent shall take the URL and detection screenshot and advance the case.

Contact Chat Support and Norton Phone Number (related notes here)

No change at this time.
Norton 360 Safe Web engine reports JS:Agent-ENC [Trj]
Norton Private Browser Web Shield is quiet
Norton Safe Web extension reports Safe

Hello, i submitted for dispute and review to Norton. I am waiting 48 hours.

Thank you for all

jeanluc.ferre

https://www.paroisse-mamers.fr/
https://www.paroisse-mamers.fr/media/com-slideshowck/assets/jquery.easing.1.3.js?aab4c7


3ad57ce8ad41/2026-02-23T22:09:45.701Z


360c390df1d1/2026-02-23T22:09:58.245Z

======================================

=====================================


404 Not Found
This usually means SiteCheck found a broken link on your website. Please check the URL specified in the SiteCheck results and try to fix it on your web pages.

=====================================

https://sitecheck.sucuri.net/results/https/www.paroisse-mamers.fr


https://labs.sucuri.net/signatures/sitecheck/malware.injection/

Hello, thank you for the errors that you gave me; i corrected the inserted malwares downloading the original files from the archives of the components or plugins. Thank you for all; Don’t hesitate to send me other errors that you could detect. Thank you for all. Jean Luc Ferré

1 Like

Merci Jean-Luc pour ce retour positif à la communauté Norton.
Content que vous ayez pu avoir l’aide nécessaire pour résoudre votre difficulté.
Bonne journée à vous.

Guillaume