Keyword: JS_RECOZEN.A
99727 Total Search   |   Showing Results : 1521 - 1540
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. However, as of this
This Worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the user's
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It gathers certain information on the affected
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
any of the above-mentioned, this clears advertisements on the site from where this malware is hosted and displays ads, through a hidden iframe, from any of these sites: http://www.{BLOCKED
following means: It is embedded in a Microsoft Word Document file and will execute its routine upon activation by the user. Download Routine This Trojan saves the files it downloads using the following names:
Trojan does not have any backdoor routine. Download Routine This Trojan connects to the following website(s) to download and execute a malicious file: http://www.{BLOCKED}s.{BLOCKED}t.ru/87b3ff3rc?ClKmkSII
This Trojan connects to the following website(s) to download and execute a malicious file: http://{BLOCKED}ei.com/i1tko8uh http://{BLOCKED}kerapts.com/mlkxh http://{BLOCKED}med.ca/pyskwfnpu http://
This Trojan may be hosted on a website and run when a user accesses the said website. Once a compromised site is visited, the user is redirected to a certain malicious site. Arrival Details This
This Trojan may be hosted on a website and run when a user accesses the said website. Once a compromised site is visited, the user is redirected to a certain malicious site. Arrival Details This
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain a malicious script. It redirects browsers to certain
banking or finance-related websites. Infection Points This spyware arrives as a file downloaded from the following URLs: http://{BLOCKED}storage.com/user1/nps329/bot.exe Installation This spyware drops the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a