Keyword: HTML_AGENT
15939 Total Search   |   Showing Results : 2541 - 2560
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
following: Generates malicious HTML files with embedded JavaScript (JS) that exploit a vulnerability in Microsoft Internet Explorer (IE). Exploiting the said vulnerability by a malware can allow remote code
This Trojan takes advantage of the following software vulnerabilities to drop malicious files: Certain versions of Adobe Acrobat and Reader util.printd and Collab.CollectEmailInfo functions This
It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry entries to enable its automatic execution at every system startup.
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious routines
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when
This Trojan inserts an IFRAME tag that redirects users to certain URLs. Other Details This Trojan inserts an IFRAME tag that redirects users to the following URLs: http://www.liagand.cn/hlp/
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
Dropping Routine This Trojan takes advantage of the following software vulnerabilities to drop malicious files: Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and UNIX (CVE-2010-2883)
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be downloaded from
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It opens random ports. It modifies the Internet Explorer Zone Settings. It attempts to
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be unknowingly
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It modifies the Internet
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It modifies the Internet
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It uses common
This Trojan connects to possibly malicious URLs. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival
This spyware may be dropped by other malware. It logs a user's keystrokes to steal information. Arrival Details This spyware may be dropped by other malware. It may be downloaded from the following
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a