Keyword: HTML_AGENT
15959 Total Search   |   Showing Results : 1181 - 1200
This file infector opens a hidden instance of iexplore.exe and connects to remote sites to download and execute possible malicious file(s). It is capable of injecting a malicious VBScript to HTML
This is the Trend Micro detection for HTML files with encrypted HTML codes that contains a link to a certain file. This Trojan executes when a user accesses certain websites where it is hosted.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
It may be posted on social networking sites such as Facebook . This is the Trend Micro detection for malicious HTML files that redirect user to possibly malicious sites. This Trojan may be hosted on
This Trojan may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious
tag. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL. Arrival Details This Trojan may be hosted on a website and run when a user
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME
This is an HTML file that displays a ransom message. This Trojan may be downloaded by other malware/grayware from remote sites. Arrival Details This Trojan may be downloaded by the following
This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
tag. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details
This malicious HTML file exploits a zero-day vulnerability in Internet Explorer 7, 8, and 9. The exploit leads to the dropping of a PoisonIvy backdoor. PoisonIvy backdoors are known to be widely used
malicious IFRAME tags. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL. It inserts an IFRAME tag that redirects users to certain URLs.
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
this HTML script launches a hidden IFRAME that connects to a malicious URL. It redirects browsers to certain sites. However, as of this writing, the said sites are inaccessible. Arrival Details This
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder