Keyword: HTML_AGENT
15921 Total Search   |   Showing Results : 1461 - 1480
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
hosted on a website and run when a user accesses the said website. NOTES: Other Details This is the Trend Micro detection for: Malicious HTML files that display fake alerts warning users of infection. It
Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This HTML redirects users to a website that displays pornographic pictures and videos.
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan may be hosted on a website and run when a user accesses the said website. Once a compromised site is visited, the user is redirected to a certain malicious site. However, as of this
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
HTML will redirect users to a site that displays pornographic pictures and videos.
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan displays fake alerts that may trick the user into downloading more malicious files onto the affected system or reveal confidential information that could be sent to malicious users and
This Trojan may be hosted on a website and run when a user accesses the said website. Once a compromised site is visited, the user is redirected to a certain malicious site. Arrival Details This
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Once a compromised site is visited, the user is redirected to a certain malicious site. However, as of this
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
page, this HTML script launches a hidden iframe that connects to the following site related to pornography: http://click.{BLOCKED}v2.com/Click/1-319-124660 12 for 2012: What Will The New Year Bring?
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. It redirects
This malware is an infection vector related to a vulnerability which is triggered when Windows Multimedia Library in Windows Media Player (WMP) fails to handle a specially crafted MIDI file,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This Trojan executes when a user accesses certain websites where it is hosted. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag.