Search
Keyword: JS_AGENT
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
%Program Files%\gnucleus\downloads\Sybot - Search & Destroy .exe %Program Files%\gnucleus\downloads\Copernic Agent .exe %Program Files%\gnucleus\downloads\Winamp .exe %Program Files%\gnucleus\downloads\Diet
CVE-2005-1272 cve: Stack-based buffer overflow in the Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 allows remote attackers to execute arbitrary code
Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\m1RC DateUsed = "1354739051" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ m1RC DisplayName = "m1RC
HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Uninstall\ mIRC HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed =
\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed = "1324714786
\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed = "1367482722" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall
\Classes\ irc\Shell\open\ ddeexec\ifexec HKEY_LOCAL_MACHINE\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries:
\Classes\ irc\Shell\open\ ddeexec\ifexec HKEY_LOCAL_MACHINE\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries:
\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed = "1326477047" HKEY_LOCAL_MACHINE
\Software\Classes\ irc\Shell\open\ ddeexec\ifexec HKEY_CURRENT_USER\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry
\svchost.exe -uninstall" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ irc EditFlags = "{random values}" HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent VoiceEnabled = "1" HKEY_CURRENT_USER\Software\Microsoft
malware/grayware packages. Installation This potentially unwanted application drops the following files: %System%\dat\Dexon\Agent\Agent.exe %System%\dat\Dexon\Agent\Agent_Distrib.exe %System%\dat\Dexon\Agent
\BabylonOfficePI.dll %Program Files%\Babylon\Babylon-Pro\Utils\BabylonRPI.api %Program Files%\Babylon\Babylon-Pro\Utils\BabylonChrome.crx %Program Files%\Babylon\Babylon-Pro\Agent\BabylonAgent.exe %Program Files%
RtcSrv SAP Business One RSP Agent Service SAPB1iDIProxy SAPB1iDIProxy_Monitor SAPB1iEventSender savsvc SBOClientAgent SBODI_Server SBOJobServiceBackEnd SBOMail SBOWFDataAccess SBOWorkflowEngine secbizsrv
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites.