Keyword: VBS_AGENT
13417 Total Search   |   Showing Results : 3701 - 3720
This backdoor may be dropped by other malware. Arrival Details This backdoor may be dropped by the following malware: TROJ_DROPPER.TD Backdoor Routine This backdoor opens the following port(s) where
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan takes advantage of the following software vulnerabilities to download possibly malicious files: Vulnerability in certain versions of The Java Runtime Environment (JRE) This Trojan may
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
This Trojan downloads a file specified in its command-line parameter and saves it as a certain file. This Trojan arrives as a component bundled with malware/grayware packages. Arrival Details This
This Trojan may be dropped by other malware. It is a component of other malware. Its rootkit functionalities are used by other malware/grayware. Arrival Details This Trojan may be dropped by the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable the Windows
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This spyware creates certain folders. This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details
This spyware may be installed as a service by its main component. It exports functions that may be used by another malware to perform its malicious routines. This spyware may arrive bundled with
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself. Arrival
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It also has rootkit
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. However, as