Search
Keyword: VBS_AGENT
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
CVE-2007-3040 Stack-based buffer overflow in agentdpv.dll 2.0.0.3425 in Microsoft Agent on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a crafted URL to the Agent
\cmd.exe" /C net stop "SQLsafe Backup Service" /y "%System%\cmd.exe" /C net stop "SQLsafe Filter Service" /y "%System%\cmd.exe" /C net stop "Sophos Agent" /y "%System%\cmd.exe" /C net stop "Sophos AutoUpdate
SentinelStaticEngine SepMasterService SepMasterServiceMig ShMonitor Smcinst SmcService SMTPSvc SNAC SnowInventoryClient SntpService Sophos Agent Sophos AutoUpdate Service Sophos Clean Service Sophos Device Control
GPSMediaSvr GPSLoginSvr GPSTomcat6 GPSMysqld GPSFtpd Zabbix Agent BackupExecAgentAccelerator bedbg BackupExecDeviceMediaService BackupExecRPCService BackupExecAgentBrowser BackupExecJobEngine
This malicious script is noteworthy due to its use in what looks like a targeted attack via Webmail. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
\Microsoft\ Windows\CurrentVersion\Uninstall\ ShopAtHomeSelect Agent DisplayName = "ShopAtHomeSelect Agent" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ ShopAtHomeSelect Agent
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent\Post Platform HKEY_CURRENT_USER\AppEvents\Schemes\ Apps\Explorer\Navigating\ Old_Current It deletes the following registry keys:
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This