Keyword: generic downloader.v
43852 Total Search   |   Showing Results : 381 - 400
This is a Trend Micro generic detection for specially crafted Microsoft Office documents that exploits CVE-2006-3059 to allow remote attackers to execute arbitrary commands in the affected system.
This is a Trend Micro generic detection for specially crafted Microsoft Office documents that exploits CVE-2006-1540 to allow remote attackers to execute arbitrary commands in the affected system.
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-1308 to allow remote attackers to execute arbitrary commands in the affected
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-1309 to allow remote attackers to execute arbitrary commands in the affected
This is a Trend Micro generic detection for specially crafted Microsoft Office Word documents that exploits CVE-2006-2492 to allow remote attackers to execute arbitrary commands in the affected
This is the Trend Micro generic detection for Flash files with ActionsScript that exploits CVE-2007-0071 to enable remote attackers to execute arbitrary commands on the affected system. Visit the
This is the Trend Micro generic detection for Flash files with ActionsScript that exploit CVE-2009-1862 to enable remote attackers to execute arbitrary commands on the affected system. Visit the
}inumiden.com/up.php?{random characters} http://{BLOCKED}berot.com/up.php?{random characters} NOTES: This is a component of a FAKEAV malware. Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.bz (McAfee);
Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.bz (McAfee); Trojan.Win32.FakeAV.lixx (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Trojan.Generic.7343299 (FSecure)
drops the following files: /antrax10 This report is generated via an automated analysis system. Trojan:Win32/Bumat!rts (Microsoft); Generic Dropper!1dx (McAfee); Trojan.Gen (Symantec); ARC:PEBundle, [0407
report is generated via an automated analysis system. Trojan:Win32/Camec.D (Microsoft); Generic PWS.wb (McAfee); Trojan.Win32.Generic.pak!cobra (Sunbelt); Gen:Trojan.Heur.fm0@szCD5hniX (FSecure)
%System Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Generic Downloader.x!gj3 (McAfee);
the Windows folder, which is usually C:\Windows or C:\WINNT.) This report is generated via an automated analysis system. Backdoor:Win32/Agent.gen!A (Microsoft); Generic Dropper.hv (McAfee); Trojan Horse
=0203871161670D1391 This report is generated via an automated analysis system. Backdoor:Win32/Simbot.gen (Microsoft); Generic BackDoor!fdr (McAfee); Trojan.Gen.2 (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
after execution. This report is generated via an automated analysis system. Backdoor:Win32/Simda (Microsoft); Generic BackDoor.acr (McAfee); Backdoor.Win32.Simda.a (v) (Sunbelt)
\RealUpgradeLogonTaskS-2-9-64-65887412.job (Note: %Windows% is the Windows folder, which is usually C:\Windows.) This report is generated via an automated analysis system. Trojan:Win32/Starter.O (Microsoft); Generic BackDoor!fgh (McAfee);
every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run himem = "%Windows%\himem.exe 3fff 8ffff" This report is generated via an automated analysis system. Generic VB.b
Generic VB.b (McAfee); Trojan.KillAV (Symantec); Trojan-Spy.Win32.Ardamax.afh (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Trojan horse VBCrypt.CNC (AVG)
Windows system folder, which is usually C:\Windows\System32.) This report is generated via an automated analysis system. TrojanDownloader:Win32/Small (Microsoft); Generic Downloader.s (McAfee); W32.SillyFDC
(Microsoft); Generic Downloader.x!fhs (McAfee); Downloader (Symantec); Trojan-Downloader.Win32.Fosniw.ue (Kaspersky); Trojan-Downloader.Win32.Fosniw.b (v) (Sunbelt); Trojan.Generic.5974945 (FSecure)