Keyword: VBS_AGENT
13417 Total Search   |   Showing Results : 3761 - 3780
This backdoor may be dropped by other malware. It opens a hidden Internet Explorer window. It connects to a website to send and receive information. Arrival Details This backdoor may be dropped by
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics of rootkit component files of other malware. If your Trend Micro product detects a
This Trojan deletes itself after execution. Installation This Trojan drops the following copies of itself into the affected system: %User Temp%\AcroRD32.exe (Note: %User Temp% is the current user's
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This cracking application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It
This malware is a component of a Blackhole exploit kit that may be used to drop or download files. It needs other components to function properly. After successfully exploiting the said
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
the following registry keys: HKEY_CLASSES_ROOT\MJ HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ MJ HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent HKEY_CURRENT_USER
File List HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\ PJM\Settings HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent HKEY_CURRENT_USER
\Recent File List HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\ Master Jobs\Settings HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
File List HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\ PJM\Settings HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent HKEY_CURRENT_USER
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It requires its main component to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a