Search
Keyword: generic downloader.v
Description Name: Possible IE exploit - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely comprom...
Description Name: JBOSSAS COMMAND EXECUTION EXPLOIT - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Intelligence Gathering.The host exhibiting this type of network behav...
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Trojan:Win32/EyeStye.N (Microsoft); Generic
Generic PWS.y!dp3 (McAfee); Trojan-Spy.Win32.SpyEyes.plb (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Suspicious:W32/Malware!Gemini (FSecure)
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Generic BackDoor.rz (McAfee); Trojan.FakeAV
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Trojan:Win32/EyeStye.N (Microsoft); Generic
Generic BackDoor.rz (McAfee); Trojan.FakeAV!gen71 (Symantec); Trojan-Spy.Win32.SpyEyes.zyz (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt)
TrojanSpy:Win32/Vwealer.KZ (Microsoft); Generic PWS.g (McAfee); W32.SillyWNSE (Symantec); Email-Worm.Win32.VB.cb, Email-Worm.Win32.VB.cb (Kaspersky); Trojan.Win32.Generic.pak!cobra (Sunbelt); Trojan.Spy.Agent.NKG (FSecure)
(Microsoft); Generic trojan.i (McAfee); Trojan-PSW.Win32.Fareit.azft (Kaspersky); Troj/DwnLdr-MPM (Sophos); Win32.Malware!Drop (Sunbelt); Trojan horse Zbot.ADNB (AVG)
(Symantec); Generic PUA PE (PUA) (Sophos); RDN/Generic PUP.z (McAfee);
Description Name: CVE-2017-9798 - APACHE OPTIONSBLEED Vulnerability - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Intelligence Gathering.The host exhibiting this type...
Description Name: EMPIRE - HTTP (Request) - Variant 3 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Command and Control Communication.The host exhibiting this type of network behavior ...
Vulnerability (CVE-2012-1858) 12-Jul-12 YES CVE-2012-1859 1000552 Generic Cross Site Scripting (XSS) Prevention 18-Jul-06 NO CVE-2012-1859 1000552 Generic Cross Site Scripting (XSS) Prevention 18-Jul-06 NO
system. Trojan:Win32/Alureon.EC (Microsoft); Generic Malware.mn (McAfee); Backdoor.Tidserv!gen15 (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Trojan-Dropper:W32/TDSS.HX (FSecure)
download files: http://{BLOCKED}soltes.osa.pl/showthread.php?t=712290 As of this writing, the said sites are inaccessible. TrojanDownloader:Win32/Karagany.G (Microsoft); Generic Downloader.lc (Mcafee);
system. Trojan:Win32/Alureon.EC (Microsoft); Generic Malware.mn (McAfee); Trojan.Gen.2 (Symantec); Rootkit.Win32.TDSS.ajhn (Kaspersky); FraudTool.Win32.FakeRean.i (v) (Sunbelt)
}aftsi.com/up.php?{random characters} This report is generated via an automated analysis system. Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.bz (McAfee); Trojan.Gen.2 (Symantec); Trojan.Win32.FakeAV.ljwx
generated via an automated analysis system. TrojanDownloader:Win32/Bedobot.A (Microsoft); Generic Downloader.x!fzn (McAfee); Trojan.Gen.2 (Symantec); Trojan-Downloader.Win32.Banload.blrt (Kaspersky);
system. Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.bz (McAfee); Trojan.Win32.FakeAV.jhzl (Kaspersky)
}irtaca.com/up.php?{random characters} This report is generated via an automated analysis system. Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.bz (McAfee); Trojan.Gen.2 (Symantec); Trojan.Win32.FakeAV.kmpn