Keyword: JS_RECOZEN.B
29558 Total Search   |   Showing Results : 2601 - 2620
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain malicious IFRAME tags. It redirects browsers to certain
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain a malicious script. It redirects browsers to certain
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain a malicious script. It redirects browsers to certain
path and file name} It creates the following folders: %System Root%\js\ (Note: %System Root% is the root folder, which is usually C:\. It is also where the operating system is located.) Other System
This Trojan executes when a user accesses certain websites where it is hosted. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This spyware is able to generate a number of domains. It is able to connect to any of its generated domains to download possibly malicious files. To get a one-glance comprehensive view of the
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were
This malware is a JavaScript component of the Blackhole Exploit kit. It is responsible for searching vulnerable software on the user's machine in order to deploy specific exploits and ultimately,
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. It may be downloaded from
This worm may be unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run when a user accesses the said website. It gathers target email addresses
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes when a user accesses certain websites where
Trend Micro has flagged this malware as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. To get a one-glance comprehensive view of the behavior of this
Download Routine Trend Micro detects the dowloaded file as: .PDF files that contain malicious JavaScript code. Samples detected by this pattern may either download or drop another malware to the
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This is the Trend Micro detection for certain malicious JavaScript (JS) files embedded on HTML Web pages. When run, it connects to Twitter sites. These sites are used by the malicious script to
This malware spreads via the <i>Facebook</i> chat feature. It entices users to click a link by saying that it leads to an execution video of Osama bin Laden. To get a one-glance
This malware exploits a vulnerability in Internet Explorer to enable remote attackers to execute arbitrary commands on the affected system. The said vulnerability is addressed in the bulletin