Keyword: HTML_IFRAME
5846 Total Search   |   Showing Results : 261 - 280
Checks for the following folders C:\inetpub\ C:\xampp\ C:\wamp\ C:\phpStudy\PHPTutorial\WWW\ then infect all html files from these folders with a malicious iframe that executes C:\important\important.exe
HTML_CLICKR.SMA inserts an IFRAME tag that redirects users to this URL.
HTML_CLICKR.SMA inserts an IFRAME tag that redirects users to this URL.
HTML_CLICKR.SMA i nserts an IFRAME tag that redirects users to this URL.
HTML_CLICKR.SMA i nserts an IFRAME tag that redirects users to this URL.
HTML_IFRAME.SMAX may be downloaded from this remote site.
HTML_IFRAME.SMAX may be downloaded from this remote site.
related to HTML_IFRAME.ALR.
HTML_IFRAME.LLB connects to this possibly malicious URL.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware from remote sites. It executes the
Slowloris, UDP, and SYN flooding Send MSN Messenger messages Insert iframe tags into HTML files Visit a Web page Create processes Block DNS Redirect domains Steal login credentials Log in to FTP sites It
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain a malicious script. It redirects browsers to certain
executes the following commands from a remote malicious user: Block DNS Create processes Download other files Insert iFrame tags into HTML files Join an IRC channel Log in to FTP sites Perform Slowloris,
backdoor capabilities: Block DNS Create processes Download other files Insert iframe tags into HTML files Join an IRC channel Log in to FTP sites Perfrom Slowloris, UDP, and SYN flooding Run Reverse Socks4
file name}:*:Enabled:ldrsoft" NOTES: Other Details This spyware deletes itself after execution. It may be downloaded unknowingly when visiting infected Web pages. An iframe inserted in the page will
URLDownloadToFileW It monitors the following browsers: chrome firefox flock ieuser iexplore opera It has the following backdoor capabilities: Block DNS Create processes Download other files Insert iframe tags into
an unsuspecting user visits an affected web page, this HTML script launches a hidden IFRAME that connects to the following URL: http://{BLOCKED}ankra.ru:8080/images/aublbzdni.php As a result, routines
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
an unsuspecting user visits an affected web page, this HTML script launches a hidden IFRAME that connects to the following URL: http://{BLOCKED}aofghjtr.ru:8080/images/aublbzdni.php As a result,
worm executes the following commands from a remote malicious user: Update itself Download other files Perfrom Slowloris, UDP, and SYN flooding Send MSN Messenger messages Insert iframe tags into HTML