Search
Keyword: generic downloader.v
}cifica.com/up.php?{random characters} Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.bz (McAfee); Trojan.FakeAV (Symantec); Trojan.Win32.FakeAV.lnac (Kaspersky); ERROR (Sunbelt); Trojan.Generic.KDV.580216
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2012-0158 to allow remote attackers to execute arbitrary commands in the affected
an automated analysis system. Trojan:Win32/Swisyn (Microsoft); Generic VB.fu (McAfee); W32.Gosys (Symantec); Trojan.Win32.Swisyn.bwfd, Trojan.Win32.Swisyn.bwfd (Kaspersky); Trojan.Win32.Generic.pak
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Trojan:Win32/VB.ABU (Microsoft); Generic
system. TrojanDropper:Win32/Bifrose.F (Microsoft); Generic VB.fs (McAfee); Backdoor.Bifrose (Symantec); Trojan.Win32.Refroso.ejge, Trojan.Win32.Refroso.ejge (Kaspersky); Trojan.Win32.Bifrose.smi (v)
TrojanDownloader:Win32/Small.gen!AQ (Microsoft); Generic Downloader.x!fwv (McAfee); Downloader (Symantec); Trojan-Downloader.Win32.Agent.eopq, Trojan-Downloader.Win32.Agent.eopq (Kaspersky); Trojan-Downloader.Win32.Small (Sunbelt);
Generic PWS.y!xh (McAfee); Infostealer.Bancos (Symantec); Trojan.Win32.Generic.pak!cobra (Sunbelt); Trojan horse PSW.Generic6.AXZI (AVG)
%System% is the Windows system folder, which is usually C:\Windows\System32.) This report is generated via an automated analysis system. PWS:Win32/OnLineGames.FT (Microsoft); Generic Dropper.eb
(Microsoft); Generic Malware.mn (McAfee); Backdoor.Tidserv!gen15 (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Trojan.Generic.KD.124293 (FSecure)
}5.32.101 {BLOCKED}.250.234 This report is generated via an automated analysis system. Trojan:Win32/Nusdimm.A (Microsoft); Generic BackDoor.s (McAfee); Trojan.Gen (Symantec); Trojan.Win32.Generic!BT (Sunbelt
after execution. This report is generated via an automated analysis system. Backdoor:Win32/Simda.gen!E (Microsoft); Generic BackDoor.abp (McAfee); Trojan.Gen (Symantec); Trojan.Win32.Inject.ejbl
WhatsApp, Messenger, LINE, and LoveChat. Once installed on a device ANDROIDOS_STEALERC32 will perform the following actions: Recording calls Retrieving generic phone metadata (e.g., cell location, mobile
as of this writing, the said sites are inaccessible. HEUR:Trojan.Win32.Generic (KASPERSKY), Trojan:Win32/Skeeyah.A!bit (MICROSOFT), Trojan.GenericKD.5031265 (BITDEFENDER), Generic Trojan.i (NAI)
Generic PWS.y!bip (McAfee); Trojan.Gen (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Win32/Delf (AVG)
execution. This report is generated via an automated analysis system. PWS:Win32/Fareit.gen!E (Microsoft); Generic BackDoor.adp (McAfee); Backdoor.Cycbot (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
generated via an automated analysis system. Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.bz (McAfee); UltraDefragFraud!gen11 (Symantec); Trojan.Win32.Fakesysdef.ae (v) (Sunbelt); Win32/Cryptor (AVG)
after execution. This report is generated via an automated analysis system. Backdoor:Win32/Simda (Microsoft); Generic FakeAlert.gp (McAfee); Trojan.Galapoper.A (Symantec); Trojan.Win32.DelfInject.akj
Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
Description Name: CVE-2016-6662 - MySQL Remote Code Execution Exploit . This is Trend Micro detection for MYSQL network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of...