Keyword: VBS_AGENT
13406 Total Search   |   Showing Results : 961 - 980
VKHOST variants are downloader malware that modify the affected system's HOSTS files to prevent a user from accessing certain websites. Installation This worm drops the following non-malicious files:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file
This Trojan may arrive bundled with malware packages as a malware component. Arrival Details This Trojan may arrive bundled with malware packages as a malware component. Dropping Routine This Trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. It is a component of other malware. Arrival Details This Trojan may be dropped by the following malware: VBS_JENXCUS.A Installation This Trojan is a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware connects to URLs to display ads. This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It opens a hidden Internet Explorer window. Arrival Details This
This malware arrives with other component files in a self-extracting archive downloaded unknowingly by a user from links in spammed messagels. It uses the non-malicious files CSSRS.EXE and SYSTEM.EXE
This malware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This malware arrives on a system as a
This Trojan may be dropped by other malware. It does not have any propagation routine. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: Once executed, this Trojan searches for the file C:\TEMP\pAjsg.b64 , extracts a file,
This Trojan may arrive bundled with malware packages as a malware component. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This Trojan may be dropped by other malware. It is a component of other malware. It requires its main component to successfully perform its intended routine. It automatically executes files when a
This Trojan may be dropped by other malware. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Arrival Details This Trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan creates the following folders: %Windows%\ime\wime %Windows%\ime\vbs