Keyword: HTML_IESLICE
5710 Total Search   |   Showing Results : 3221 - 3240
JS_EXPLOIT.SMAD may be downloaded from this malicious URL.
HTML_FAKEAL.DVU redirects browsers to this malicious site.
TSPY_ZBOT.SMMY connects to thus URL to download its configuration file.
HTML_IFRAME.LLB connects to this possibly malicious URL.
HTML_PORN connects to this malicious URL which contains pornographic content. The page only displays an Apache 2 test page.
HTML_HTAPORN connects to this malicious URL which contains pornographic content. Upon viewing the page it displays {BLOCKED}1.{BLOCKED}re-movies.com , a URL that is possibly malicious and contains
HTML_HTAPORN connects to this malicious URL which contains pornographic content.
HTML_PORNY connects to this malicious URL which contains pornographic content.
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It adds registry entries to enable its automatic
This Trojan has two embedded .SWF files in its body that it uses to exploit CVE-2011-0611. The two .SWF files are detected as SWF_EXPLOIT.WS. If exploit is successful, it drops files. This Trojan
It monitors specific URLs. If users access these monitored sites, they are redirected by this malware to specific malicious sites. This Trojan may be dropped by other malware. Arrival Details This
This specially crafted .DOC file takes advantage of a vulnerability in certain versions of Adobe Flash Player to drop an embedded .SWF file detected by Trend Micro as SWF_DROPPER.A. This Trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a