Keyword: JS_RECOZEN.A
100096 Total Search   |   Showing Results : 2341 - 2360
executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. It does not have any downloading capability. It does not have any information-stealing
This Trojan executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival Details This Trojan may be unknowingly downloaded by a
This JavaScript malware connects to certain sites in order to execute malicious codes. As a result, malicious routines of the executed malware are exhibited on the infected system. This Trojan may be
This JavaScript has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes then deletes itself afterward. It executes the downloaded files. As a result,
executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the said sites are inaccessible. Arrival Details This Trojan
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
following website(s) to download and execute a malicious file: http://{BLOCKED}vidades.com/bsdz22c8 http://www.{BLOCKED}neguy.talktalk.net/31702 http://{BLOCKED}ro.com/2qohq7 It saves the files it downloads
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
This Trojan Spy may be downloaded by other malware/grayware from remote sites. Arrival Details This Trojan Spy may be downloaded by the following malware/grayware from remote sites:
This Trojan may arrive bundled with malware packages as a malware component. Arrival Details This Trojan may arrive bundled with malware packages as a malware component. NOTES: This trojan is an
This Trojan executes when a user accesses certain websites where it is hosted. It contains errors in its code. This stops it from performing its routines. Arrival Details This Trojan executes when a
This Trojan may arrive bundled with malware packages as a malware component. Arrival Details This Trojan may arrive bundled with malware packages as a malware component. NOTES: This Trojan is an
This Trojan executes when a user accesses certain websites where it is hosted. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan executes when a user accesses