Search
Keyword: generic downloader.v
This is a Trend Micro generic detection for specially crafted Microsoft Office documents that exploits CVE-2006-0009 to allow remote attackers to execute arbitrary commands in the affected system.
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-1304 to allow remote attackers to execute arbitrary commands in the affected
Exploit:Java/CVE-2010-0840.FW (Microsoft); Exploit.Java.CVE-2010-0840.bz (Kaspersky); Generic Exploit!by (McAfee)
perform its intended routine. Backdoor.Trojan (Symantec); Backdoor.Win32.Papras.api (Kaspersky); Generic BackDoor!dae (Mcafee)
application requires its main component to successfully perform its intended routine. Generic PUA JP (Sophos); Win32.Trojan.Agent.Tafl (Tencent); Win32.SuspectCrc (Ikarus)
Trojan Horse(Symantec), Mal/Generic-A(Sophos), Trojan-Dropper.Win32.VB.afc(Kaspersky), TR/Dropper.Gen(Avira), W32/DropperX.JPO (exact(F-Prot), Generic Dropper(McAfee)
drops the following files: %WinDir%\Server.exe %WinDir%\Zenyth AV Tool.exe This report is generated via an automated analysis system. TrojanDropper:Win32/Amighelo.A (Microsoft); Generic Dropper.id (McAfee
the Windows folder, which is usually C:\Windows.) This report is generated via an automated analysis system. Worm:Win32/VB.WB (Microsoft); Generic Downloader.z (McAfee); Trojan Horse (Symantec);
}8.117.106/loader.php?l=0409&adv=23 This report is generated via an automated analysis system. TrojanDownloader:Win32/Bredolab.A (Microsoft); Generic Downloader.ab (McAfee); Downloader (Symantec);
Windows Temporary folder, which is usually C:\Windows\Temp.) This report is generated via an automated analysis system. TrojanDownloader:Win32/Waledac.R (Microsoft); Generic BackDoor.aej (McAfee);
malicious URL: http://wordpress.{BLOCKED}on.com/wp-content/plugins/123.txt {BLOCKED}0.1 {BLOCKED}2.106.165 It deletes itself after execution. This report is generated via an automated analysis system. Generic
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Generic Downloader.x!ggj (McAfee);
malicious URL: {random IP addresses} Trojan:Win32/Malagent (Microsoft), Trojan-PSW.Win32.Tepfer.eqwe, Generic BackDoor.afz (McAfee)
the Windows system folder, which is usually C:\Windows\System32.) This report is generated via an automated analysis system. Backdoor:Win32/Hostil.gen!A (Microsoft); Generic BackDoor!dqs (McAfee);
are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000552| 1000552 - Generic Cross Site
refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
applying appropriate DPI and/or IDF rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention