Search
Keyword: VBS_AGENT
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This Trojan may be downloaded from remote sites by other malware. Arrival Details This Trojan may be downloaded from the following remote site(s): http://web.kfc.ha.cn:6668/Down/my/124.exe It may be
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. Arrival Details This Trojan may arrive bundled with malware packages as a malware component. NOTES: This Trojan executes
This worm arrives as attachment to mass-mailed email messages. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
\VersionNames HKEY_CURRENT_USER\Software\Context2pro\ contextprod\Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\Context2pro\ contextprod\System RqT = "493e" HKEY_CURRENT_USER\Software
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
HKEY_CURRENT_USER\Software\Context2pro\ context2prod\VersionNames HKEY_CURRENT_USER\Software\Context2pro\ context2prod\Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\Context2pro
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. This is the Trend Micro detection for files that contain
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan gathers device information. It downloads malicious files. It sends SMS messages to premium numbers, resulting in unwanted charges billed to you. It drops and runs other files on the
Application adds the following processes: NET START SLEEPYN1 It creates the following folders: %Program Files%\LEVTEMP %Program Files%\LeverIT %Program Files%\LeverIT\Agent %Program Files%\LeverIT\Agent\Instok
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
information: HTTP_USER_AGENT - user agent HTTP_REFERER - address of the page which referred the user agent to the current page REMOTE_ADDR - ip address from which the user is viewing the current page HTTP_HOST -
CVE-2005-4734 Stack-based buffer overflow in IISWebAgentIF.dll in RSA Authentication Agent for Web (aka SecurID Web Agent) 5.2 and 5.3 for IIS allows remote attackers to execute arbitrary code via a
vmicshutdown sc delete vmictimesync sc delete vmicvss sc stop 1C:Enterprise 8.3 Configuration Repository Server sc stop 1C:Enterprise 8.3 Server Agent (x86-64) sc stop 1C:Enterprise 8.3.16.1224 Remote Server