Keyword: HTML_AGENT
15951 Total Search   |   Showing Results : 3541 - 3560
worm executes the following commands from a remote malicious user: Update itself Download other files Perfrom Slowloris, UDP, and SYN flooding Send MSN Messenger messages Insert iframe tags into HTML
This is the first known Android malware that reads blog posts and interprets these as commands. It can also download and install additional applications, therefore further compromising the affected
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival Details
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the
This backdoor may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the
This backdoor may be downloaded by other malware/grayware from remote sites. Arrival Details This backdoor may be downloaded by the following malware/grayware from remote sites: HTML_EXPLOYT.AE
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following non-malicious files: %System Root%
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan may be hosted on a website and run when a user accesses the said website. It may be downloaded unknowingly by a user when visiting malicious website(s). It requires its main component to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
exhibit certain behaviors. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Other Details This is the Trend Micro detection for: malicious HTML files that disguises itself as
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run when a user accesses the said website. NOTES: This is Trend Micro's detection for infected HTML files
server URL}" When the browser loads a web page, it checks if the URL is defined in HKEY_CURRENT_USER\UDP\c . If the URL is defined, it injects HTML with JavaScript codes to the loading web page. It checks
Micro detection for HTML files with an encrypted JavaScript in a <div> tag, and its decryptor. Samples of this malware are seen to exploit the following vulnerabilities: CVE-2010-3552 CVE-2010-4452
This is the Trend Micro generic detection for Flash files with ActionsScript that exploit CVE-2009-1862 to enable remote attackers to execute arbitrary commands on the affected system. Visit the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes downloaded files whose malicious routines
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites. It may be