Search
Keyword: HTML_AGENT
This malware is related to the fake flash player scam targeting users in Turkey. It starts with a video link sent via Facebook. This malware specifically pretends as the update and installs the bogus
This malware is associated with attacks involving malicious attachments for Hangul Word Processor (HWP). In the attack, PostScript is used to gain access to a victim's machine. This Trojan arrives on
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Hacking Tool arrives on a
intuit.quickbooks.fcs qbcfmonitorservice yoobackup yooit zhudongfangyu stc _ raw _ agent vsnapvss veeamtransportsvc veeamdeploymentservice veeamnfssvc pdvfsservice backupexecvssprovider backupexeca-gentaccelerator
HTML_AGENT.AA accesses this website to download files.
This Trojan may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the
This Trojan takes advantage of a vulnerability in a certain software to drop malicious files. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by
This hacking tool is a command-line program that may be used to sniff certain information and save them into a file. This hacking tool arrives on a system as a file dropped by other malware or as a
This Trojan may also arrive as a script embedded in the message of an email. This Trojan arrives as attachment to mass-mailed email messages. It inserts an IFRAME tag that redirects users to certain
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It opens a hidden Internet Explorer window. Arrival Details This backdoor may be unknowingly downloaded by a
The infected files are detected as PE_FUJACKS.RC. It deletes a file. It drops files in folders as an infection marker. It creates registry entries to disable execution of programs related to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a