Keyword: usoj_agent.aujq
10705 Total Search   |   Showing Results : 1 - 20
   Next  
This malware arrives as a file with ".p7c" extension (Digital ID File) and is bundled with a malware detected by Trend Micro as TROJ_LOADR.AUJQ as its autostart component. This Trojan arrives as
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
%Program Files%\gnucleus\downloads\Sybot - Search & Destroy .exe %Program Files%\gnucleus\downloads\Copernic Agent .exe %Program Files%\gnucleus\downloads\Winamp .exe %Program Files%\gnucleus\downloads\Diet
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
CVE-2005-1272 cve: Stack-based buffer overflow in the Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 allows remote attackers to execute arbitrary code
Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\m1RC DateUsed = "1354739051" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall\ m1RC DisplayName = "m1RC
HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Uninstall\ mIRC HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed =
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed = "1324714786
\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed = "1326477047" HKEY_LOCAL_MACHINE
\Classes\ irc\Shell\open\ ddeexec\ifexec HKEY_LOCAL_MACHINE\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries:
\Classes\ irc\Shell\open\ ddeexec\ifexec HKEY_LOCAL_MACHINE\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry entries:
\Software\Classes\ irc\Shell\open\ ddeexec\ifexec HKEY_CURRENT_USER\Software\Classes\ irc\Shell\open\ ddeexec\Topic HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent It adds the following registry
\Software\Microsoft\ Microsoft Agent It adds the following registry entries: HKEY_CURRENT_USER\Software\mIRC DateUsed = "1367482722" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Uninstall
\svchost.exe -uninstall" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ irc EditFlags = "{random values}" HKEY_CURRENT_USER\Software\Microsoft\ Microsoft Agent VoiceEnabled = "1" HKEY_CURRENT_USER\Software\Microsoft
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
malware/grayware packages. Installation This potentially unwanted application drops the following files: %System%\dat\Dexon\Agent\Agent.exe %System%\dat\Dexon\Agent\Agent_Distrib.exe %System%\dat\Dexon\Agent
\BabylonOfficePI.dll %Program Files%\Babylon\Babylon-Pro\Utils\BabylonRPI.api %Program Files%\Babylon\Babylon-Pro\Utils\BabylonChrome.crx %Program Files%\Babylon\Babylon-Pro\Agent\BabylonAgent.exe %Program Files%
RtcSrv SAP Business One RSP Agent Service SAPB1iDIProxy SAPB1iDIProxy_Monitor SAPB1iEventSender savsvc SBOClientAgent SBODI_Server SBOJobServiceBackEnd SBOMail SBOWFDataAccess SBOWorkflowEngine secbizsrv