Keyword: VBS_AGENT
13418 Total Search   |   Showing Results : 3721 - 3740
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. However, as
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be injected into processes running in memory.
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It does not have any propagation routine. It does not have any backdoor routine. It does
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. However, as of this
This worm arrives by connecting affected removable drives to a system. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
This backdoor may arrive as a file that exports functions used by other malware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It requires its
It gathers certain information on the affected computer. This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This backdoor connects to a certain URL to send and receive commands from a remote malicious user. This backdoor arrives on a system as a file dropped by other malware or as a file downloaded
It connects to a specific site to send the system information. It connects to the following site to receive commands from a remote user. This Trojan may be dropped by other malware. Arrival Details
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives as a Java Applet component of a malicious Java archive file (.JAR) that is hosted on a malicious website. NOTES: This Trojan arrives as a Java Applet component of a malicious Java
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself in all removable drives. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Other Details This is the Trend Micro detection for Web pages that were
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User Agent @ = {user agent information} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ 5.0\User
This worm may be dropped by other malware. Arrival Details This worm may be dropped by other malware. Installation This worm drops the following files: %Current%\ipz-db.bin %Current%\log.txt
This worm may be unknowingly downloaded by a user while visiting malicious websites. It propagates via shared networks and drops copies of itself into available networks. Arrival Details This worm