Search
Keyword: HTML_AGENT
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Winamp Agent = "%System%\winamp.exe" Other System Modifications This backdoor deletes the following files:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\SYSTEM\ControlSet001\ Services\360svc Description = "win Agent ww12234567" HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\360svc\Parameters ServiceDll = "%Windows%\LocalUser\85f8kill.dll
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of software vulnerabilities in certain software to drop malicious
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the dropped file(s). As a result, malicious routines of the
BKDR_URSNIF.SM Other Details This Trojan requires its main component to successfully perform its intended routine. NOTES: It contains the HTML codes to be injected on monitored sites. TrojanSpy:JS/Ursnif.A
This hacking tool is a command-line program that may be used to sniff certain information and save them into a file. This hacking tool arrives on a system as a file dropped by other malware or as a
The infected files are detected as PE_FUJACKS.RC. It deletes a file. It drops files in folders as an infection marker. It creates registry entries to disable execution of programs related to
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It opens a hidden Internet Explorer window. Arrival Details This backdoor may be unknowingly downloaded by a
This Trojan takes advantage of a vulnerability in a certain software to drop malicious files. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by
This Trojan may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the
This Trojan may also arrive as a script embedded in the message of an email. This Trojan arrives as attachment to mass-mailed email messages. It inserts an IFRAME tag that redirects users to certain