Keyword: VBS_AGENT
13418 Total Search   |   Showing Results : 3841 - 3860
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
\CurrentVersion\Internet Settings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Internet Settings\ User Agent\Post Platform HKEY_CURRENT_USER\Software\Microsoft\ Windows
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Other
HKEY_CLASSES_ROOT\FAST HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ 5.0\User Agent HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ 5.0\User Agent
This malware was found in January 2014 to be distributed as a key generator. Instead of generating keys, it downloads malware onto the affected system. Affected users may find malicious routines
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
\Microsoft\ Windows\CurrentVersion\Internet Setttings\ 5.0\User Agent HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ 5.0\User Agent\Post Platform HKEY_CURRENT_USER\Software
keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ 5.0\User Agent HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Setttings\ 5.0\User Agent\Post
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. Other Details This Trojan
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
downloaded code to itself. It sends the following information: HTTP_USER_AGENT - user agent HTTP_REFERER - address of the page which referred the user agent to the current page REMOTE_ADDR - IP address from
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
ShMonitor Smcinst SmcService SMTPSvc SNAC SnowInventoryClient SntpService Sophos Agent Sophos AutoUpdate Service Sophos Clean Service Sophos Device Control Service Sophos File Scanner Service Sophos Health
CVE-2009-1429 The Intel LANDesk Common Base Agent (CBA) in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This