Keyword: HTML_IFRAME
5850 Total Search   |   Showing Results : 2041 - 2060
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
sav bkp bak tmp cfg conf ini prf html php js c cc py lua go java It avoids encrypting files found in the following folders: ProgramData Windows bootmgr $WINDOWS.~BT Windows.old Temp tmp Program Files
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan executes when a user accesses certain websites where it is hosted. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: This Trojan is an Apache module for Linux that functions as an output filter. An
This Trojan Clicker arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Clicker arrives on a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
serve as ransom notes containing the following text: NOTES: The content of the dropped html as ransom note are shown in the image below: Trojan-Ransom.Win32.Jaff.g(Kaspersky);Troj/Jaff-D(Sophos
extension to the file name of the encrypted files: .needkeys It drops the following file(s) as ransom note: {Encrypted file directory}\how_to_back_files.html NOTES: The html file displays the following ransom
This malware is a variant of the ransomware family EREBUS and was discovered to be involved in an attack against South Korean webhosting company NAYANA. Users affected by this malware may find their
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses Windows Task Scheduler to create a scheduled
following image: Other Details This Ransomware does the following: This ransomware does not encrypt files. NOTES: This ransomware drops the following html file as its ransom note: Riskware/Filecoder (FORTINET
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a