Keyword: HTML_AGENT
15959 Total Search   |   Showing Results : 181 - 200
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
accesses the said website. This is the Trend Micro detection for files that contain malicious IFRAME tags. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to
file. This malicious Java class accesses the "game_id" parameter in a certain HTML file that executes this file to get the URL where a binary can be downloaded. This Trojan may be dropped by other
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. This is the Trend Micro detection for files that contain a malicious script. Arrival Details This Trojan may be
This Trojan arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
\Command Digital %Start Menu%\Programs\Command Digital\AutoHook 2010 %User Profile%\Microsoft\HTML Help (Note: %System Root% is the root folder, which is usually C:\. It is also where the operating system is
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This is the Trend Micro detection for files that exhibit certain behaviors. This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be hosted on a website and run
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Installation This Trojan drops the following files: %User Temp%
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a