Keyword: generic downloader.v
43852 Total Search   |   Showing Results : 361 - 380
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This is the Trend Micro generic detection for files that targets a Microsoft Excel
report is generated via an automated analysis system. TrojanDownloader:Win32/Renos.DZ (Microsoft); Generic Dropper.cx (McAfee); Trojan Horse (Symantec); Trojan.Win32.Agent.bnqe (Kaspersky);
}cards2005d.unlugar.com/csrs.swf This report is generated via an automated analysis system. TrojanDownloader:Win32/Delf (Microsoft); Generic Downloader.p (McAfee); Downloader.Bancos!gen (Symantec);
}slpoew.asia/update/0pdat3.exe http://{BLOCKED}dbbnennm.in/update/0pdat3.exe This report is generated via an automated analysis system. VirTool:Win32/VBInject.gen!JD (Microsoft); Generic Dropper!1z3 (McAfee); Trojan.Gen (Symantec
through your browser. No installation or download is required. Apache 1.3.x,Apache 2.0.x,Apache 2.2.x Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
filter name when applying appropriate DPI and/or IDF rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
when applying appropriate DPI and/or IDF rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
Foundation Apache HTTP Server 2.2.6 Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
Description Name: CVE-2017-0147 - Information Disclosure Exploit - SMB (Request) . This is the Trend Micro detection for malicious SMB network packet that manifest any of the following actions:ExploitThis attack is used for Point of Entry or Lateral ...
Description Name: CVE-2017-0145 - Remote Code Execution - SMB (Request) . This is the Trend Micro detection for malicious SMB network packet that manifest any of the following actions:ExploitThis attack is used for Point of Entry or Lateral Movement
!C (Microsoft); Generic Obfuscated.g (McAfee); PUA.Gen.2 (Symantec); Trojan.Win32.Generic.pak!cobra (Sunbelt)
(Microsoft); Generic PWS.ahb (McAfee); Trojan-PSW.Win32.Tepfer.cger (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt)
Trojan drops the following files: {malware file path and name} This report is generated via an automated analysis system. Generic Trojan.kj (McAfee); W97M.Downloader (Symantec);
after execution. This report is generated via an automated analysis system. VirTool:Win32/Obfuscator.ZG, VirTool:Win32/Obfuscator.ZG (Microsoft); Generic BackDoor.aca (McAfee); Backdoor.Win32.Simda.a (v)
}a-feeds.com/{random path} http://{BLOCKED}pdates.com/{random path} This report is generated via an automated analysis system. Trojan:Win32/WinSpywareProtect (Microsoft); Generic Packed.a (McAfee);
\AppDataLow Trojan Horse (Symantec); Trojan:Win32/Orsam!rts (Microsoft); Backdoor.Win32.Papras.den (Kaspersky); Generic BackDoor!dkd (Mcafee); Mal/PWS-II (Sophos)
automated analysis system. TrojanDownloader:Win32/Kuluoz.B (Microsoft); Generic Downloader.z (McAfee); Trojan.Fakeavlock (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-3059 to allow remote attackers to execute arbitrary commands in the affected
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-3431 to allow remote attackers to execute arbitrary commands in the affected
main component to successfully perform its intended routine. TrojanDropper:Win32/Boaxxe.G [Microsoft], Generic Dropper.fz [Mcafee]