Attention: We have transitioned to a new AAD or Microsoft Entra ID from the week of May 20, 2024. In case your tenant requires admin consent, please refer to this document located at Overview of user and admin consent - Microsoft Entra ID | Microsoft Learn and grant access to App ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read for continued access. While the app may appear unverified, you can confirm its legitimacy by verifying the App ID provided.
502 entries found.
Displaying page 2
of 26.
VirTool:Win32/VBInject.G
VirTool:Win32/VBInject.G is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level:
severe
VirTool:Win32/VBInject.A
VirTool:Win32/VBInject.A is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level:
severe
VirTool:Win32/VBInject.B
VirTool:Win32/VBInject.B is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level:
severe
VirTool:Win32/VBInject.C
VirTool:Win32/VBInject.C is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level:
severe
VirTool:Win32/VBInject.D
VirTool:Win32/VBInject.D is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level:
severe
VirTool:Win32/VBInject.E
VirTool:Win32/VBInject.E is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level:
severe
VirTool:Win32/VBInject.F
VirTool:Win32/VBInject.F is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level:
severe
VirTool:Win32/VBInject.AF
VirTool:Win32/VBInject.AF is a detection for obfuscated Visual Basic compiled malicious code. The malicious code or file is usually encrypted and/or compressed, and is decrypted and decoded before it is injected into a process or dropped and executed.
Alert level:
severe
VirTool:Win32/VBInject.AQ
VirTool:Win32/VBInject.AQ is the detection for obfuscated malware code. It attempts to prevent the malware code from being detected by antivirus products.
Alert level:
severe
VirTool:Win32/VBInject.DG
VirTool:Win32/VBInject.DG is a detection for an obfuscator wrapper used by malicious executables. It is written in Visual Basic.
Alert level:
severe
VirTool:Win32/VBInject.DD
VirTool:Win32/VBInject.DD is a detection for obfuscated malware. The loader is written in Visual Basic and the malicious code is stored encrypted. The original file behaves like a loader for the encrypted malicious code, thus the code could have virtually any purpose.
Alert level:
severe
VirTool:Win32/VBInject.DN
VirTool:Win32/VBInject.DN is a detection for an obfuscator wrapper used by malicious executables. The malicious executable is usually encrypted/compressed and stored inside the wrapper. When executed, it decodes the malicious executable and injects it into a clean process, for example, "explorer.exe", or loads it into a new process of its own.
Alert level:
severe
VirTool:Win32/VBInject.DS
VirTool:Win32/VBInject.DS is a generic detection for certain forms of obfuscated malware. The loader is written in Visual Basic and the malicious code is stored encrypted. The original file behaves as a loader for the encrypted malicious code, thus the code could have virtually any purpose.
Alert level:
severe
VirTool:Win32/VBInject.DU
VirTool:Win32/VBInject.DU is a detection for certain forms of obfuscated malware. The loader is written in Visual Basic and the malicious code is stored encrypted. The original file behaves as a loader for the encrypted malicious code, thus the code could have virtually any purpose.
Alert level:
severe
VirTool:Win32/VBInject.DV
VirTool:Win32/VBInject.DV is a detection for certain forms of obfuscated malware. The loader is written in Visual Basic and the malicious code is stored encrypted. The original file behaves as a loader for the encrypted malicious code, thus the code could have virtually any purpose.
Alert level:
severe
VirTool:Win32/VBInject.DR
VirTool:Win32/VBInject.DR is a detection for obfuscated Visual Basic compiled malicious code. The malicious code or file is usually encrypted and/or compressed, and is decrypted and decoded before it is injected into a process or dropped and executed.
Alert level:
severe
VirTool:Win32/VBInject.ET
Alert level:
severe
VirTool:Win32/VBInject.FF
VirTool:Win32/VBInject.FF is a detection for certain forms of obfuscated malware. The loader is written in Visual Basic and the malicious code is stored encrypted. The original file behaves as a loader for the encrypted malicious code, thus the code could have virtually any purpose.
When run, the code is decrypted and injected into the current process, so the resulted code is never written to disk, in an attempt to avoid being detected by security software. It contains code and techniques to hinder disassembly and analysis.
Alert level:
severe
VirTool:Win32/VBInject.FN
VirTool:Win32/VBInject.FN is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level:
severe
VirTool:Win32/VBInject.FQ
VirTool:Win32/VBInject.FQ is a generic detection for malicious files that are obfuscated using particular techniques to protect them from detection or analysis.
Alert level:
severe