Keyword: JS_RECOZEN.A
100096 Total Search   |   Showing Results : 2321 - 2340
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It requires being executed with a specific argument/parameter, an additional component, or
This Trojan modifies registry entries to disable various system services. This action prevents most of the system functions to be used. It does not have any propagation routine. It does not have any
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website.
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. It requires
This Trojan may be hosted on a website and run when a user accesses the said website. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan may be hosted on a
This malware allows remote Web-based file access and manipulation. It may perform certain actions on the affected system. This hacking tool may be manually installed by a user. Arrival Details This
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Other
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It deletes itself after execution. Arrival Details This Trojan
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. NOTES: This is the Trend
This is the Trend Micro detection for specially crafted .LNK files that are used to execute dropped copies of JS_MORPHE malware once this shortcut is accessed. This Trojan arrives as a component
This Trojan may be dropped by other malware. It executes then deletes itself afterward. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
vulnerability allows Java applets to run any desired ActiveX control from a Web page, or from within an HTML-based email message that would enable it to read, write, and run files on hard disks. This
This Trojan may be dropped by other malware. It is used to load and execute a file. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan is used to load and execute
This Trojan may be dropped by other malware. It is used to load and execute a file. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan is used to load and execute
This Trojan executes when a user accesses certain websites where it is hosted. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan executes when a user accesses