Keyword: VBS_AGENT
13416 Total Search   |   Showing Results : 3201 - 3220
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
\HOWTORECOVER.html It avoids encrypting files with the following file extensions: exe dll sys msi mui inf cat bat cmd ps1 vbs ttf fon lnk Downloaded from the Internet, Dropped by other malware Drops files, Modifies
This is the Trend Micro generic detection for files exhibiting suspicious behavior that may cause harm to systems. Trojans are a general malware classification for malicious files, applications, or
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders. It
%Program Files%\gnucleus\downloads\Sybot - Search & Destroy .exe %Program Files%\gnucleus\downloads\Copernic Agent .exe %Program Files%\gnucleus\downloads\Winamp .exe %Program Files%\gnucleus\downloads\Diet
CVE-2005-1272 cve: Stack-based buffer overflow in the Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 allows remote attackers to execute arbitrary code
Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\m1RC DateUsed = "1354739051" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ m1RC DisplayName = "m1RC
HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Uninstall\ mIRC HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed =
\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed = "1324714786
\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed = "1367482722" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall
\Classes\ irc\Shell\open\ ddeexec\ifexec HKEY_LOCAL_MACHINE\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries:
\Classes\ irc\Shell\open\ ddeexec\ifexec HKEY_LOCAL_MACHINE\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries:
\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed = "1326477047" HKEY_LOCAL_MACHINE
\Software\Classes\ irc\Shell\open\ ddeexec\ifexec HKEY_CURRENT_USER\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry