Search
Keyword: JS_RECOZEN.A
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
banking or finance-related websites. Infection Points This Trojan arrives as a file downloaded from the following URLs: http://{BLOCKED}7.ru/fastflux/norton_update/files/update.exe Installation This Trojan
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
downloaded by a user while visiting the following malicious websites: http://{BLOCKED}.{BLOCKED}.153.101/admminner.exe Installation This spyware adds the following folders: %Application Data%\{random1}
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
unauthorized use of the stolen data. Once users access any of the monitored sites, it starts logging keystrokes. It attempts to get information from a list of banks or financial institutions. Infection Points
as a file downloaded from the following URLs: http://{BLOCKED}yeew.ru/bin/thootham.exe Installation This Trojan adds the following folders: %Application Data%\{random1} %Application Data%\{random2}
banking or finance-related websites. It attempts to get information from a list of banks or financial institutions. Infection Points This spyware arrives as a file downloaded from the following URLs:
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It modifies the Internet
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
banking or finance-related websites. It attempts to get information from a list of banks or financial institutions. Infection Points This spyware arrives as a file downloaded from the following URLs:
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain