Keyword: HTML_AGENT
15940 Total Search   |   Showing Results : 3741 - 3760
Trend Micro has flagged this Trojan as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it exploits a 0-day vulnerability in Adobe Flash
It monitors specific URLs. If users access these monitored sites, they are redirected by this malware to specific malicious sites. This Trojan may be dropped by other malware. Arrival Details This
This specially crafted .DOC file takes advantage of a vulnerability in certain versions of Adobe Flash Player to drop an embedded .SWF file detected by Trend Micro as SWF_DROPPER.A. This Trojan
This Trojan has two embedded .SWF files in its body that it uses to exploit CVE-2011-0611. The two .SWF files are detected as SWF_EXPLOIT.WS. If exploit is successful, it drops files. This Trojan
It may be downloaded by other malware/grayware/spyware from remote sites. It arrives as an attachment to email messages spammed by other malware/grayware/spyware or malicious users. Arrival Details
It adds registry entries to enable its automatic execution at every system startup. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
Other Details This Worm adds the following lines or registry entries as part of its routine: HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\Internet Explorer\Download CheckExeSignatures=no HKEY_CURRENT_USER
After installation, ADW_INSTALLREX opens a browser, which opens this site.
This phishing site used a supposed "FIFA World Cup 2014 Promotional Draw” to convince users to share personal information.
TROJ_FEBUSER.A may be downloaded from this remote site. This malware is related to the malicious link spammed via Facebook that allegedly points to a video recording of a young woman committing
This is the Trend Micro detection for files that exhibit certain behaviors. NOTES: Other Details This is the Trend Micro detection for: script files that contains a malicious Javascript code. It does
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Trojan redirects browsers to certain sites. Other Details This Trojan redirects browsers to the following sites: http://{BLOCKED}senfoppen.nl/1.html
As of this writing, the said sites are inaccessible. Download Routine As of this writing, the said sites are inaccessible. Other Details This Trojan connects to the following possibly malicious URL:
This Trojan executes when a user accesses certain websites where it is hosted. It redirects browsers to certain sites. However, as of this writing, the said sites are inaccessible. Arrival Details
Trend Micro has flagged this JavaScript as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it exploits the recently discovered Java
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. This file contains a URL where it connects to possibly download other files. It deletes itself after execution.
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the said sites are inaccessible. It executes
This Trojan may arrive as a file that exports functions used by other malware. It arrives as a component bundled with malware/grayware packages. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes downloaded files whose malicious routines