Search
Keyword: irc generic
TrojanDownloader:Win32/Kanav (Microsoft); Generic Malware.ja (McAfee); Trojan.Gen (Symantec); Trojan.Win32.Generic!BT (Sunbelt); ERROR (AVG)
of the said registry entry is %User Profile%\Local Settings\Application Data .) This report is generated via an automated analysis system. TrojanSpy:MSIL/Crime.B (Microsoft); Generic MSIL.a (McAfee);
\MCD IO Priority = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\MCD Use Generic Stencil = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\MCD Enumerate as ICD = "0
8.5.5.2,ibm websphere_application_server 8.5.5.3 Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
possibly malicious URL: http://{BLOCKED}s.com/update.php?{random characters} http://{BLOCKED}fit.com/update.php?{random characters} This report is generated via an automated analysis system. Generic
Microsoft Excel Remote Code Execution Vulnerability (CVE-2018-0796) Web Application Common 1005613* - Generic SQL Injection Prevention - 2 1009090 - ImageMagick ReadOneMNGImage Denial Of Service Vulnerability
Server Web Application Common 1000552* - Generic Cross Site Scripting(XSS) Prevention Web Application PHP Based 1010247 - PHP 'simplestring_addn' Function Out Of Bounds Write Vulnerability (CVE-2016-6296)
Windows Live Messenger MSN Messenger Windows Messenger Backdoor Routine This worm executes the following commands from a remote malicious user: Join an IRC channel Send private messages on IRC channel
trendmicro truste.com update.microsoft. virus webroot. wilderssecurity windowsupdate NOTES: This backdoor is capable of connecting to a certain IRC server using a certain port and joins a channel where it
backdoor capabilities: Block DNS Create processes Download other files Insert iframe tags into HTML files Join an IRC channel Log in to FTP sites Perfrom Slowloris, UDP, and SYN flooding Run Reverse Socks4
Create processes Download other files Insert iframe tags into HTML files Join an IRC channel Log in to FTP sites Perfrom Slowloris, UDP, and SYN flooding Run Reverse Socks4 proxy server Send MSN Messenger
Manage open Windows Manage processes Manage registries Perform Denial of Service Perform remote shell Refresh IP Remove itself and clean autorun registry entries Set-up IRC bot Spread itself to all
the following IRC server(s): ms4all.twoplayers.net It opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the remote user executes
other files Insert iFrame tags into HTML files Join an IRC channel Log in to FTP sites Perform Slowloris, UDP, and SYN flooding Run Reverse Socks4 proxy server Send MSN Messenger messages Steal login
11-029 Dec 12, 2011 MS11-079 CVE-2011-1895 1000128 - HTTP Protocol Decoding MS11-079 CVE-2011-1896 1000552 - Generic Cross Site Scripting(XSS) Prevention MS11-079 CVE-2011-1897 1000552 - Generic Cross Site
CVE-2012-1855 1005057 - Microsoft .NET Framework Memory Access Vulnerability (CVE-2012-1855) 12-015 Jun 12, 2012 MS12-040 CVE-2012-1857 1000552 - Generic Cross Site Scripting (XSS) Prevention Jul 18, 2006
Date Vulnerability Protection and IDF Compatibility MS14-075 CVE-2014-6325 1000552 Generic Cross Site Scripting(XSS) Prevention 05-Jul-06 NO MS14-075 CVE-2014-6326 1000552 Generic Cross Site Scripting
execution. This report is generated via an automated analysis system. TrojanDownloader:Win32/Dofoil.O (Microsoft); Generic Downloader.x!g2r (McAfee); Suspicious.MH690 (Symantec);
a shell command It deletes itself after execution. Backdoor:Win32/Poison.E (Microsoft), Trojan.Win32.Agent.tkql (Kaspersky), Generic PWS.y!1ij (NAI), Troj/Agent-XNE (Sophos), Trojan.Win32.Generic!BT
malicious URL: http://{BLOCKED}1.com/1tw/at1.rar Worm:Win32/Taterf.B (Microsoft), Generic PWS.ak (McAfee), W32.Gammima.AG (Symantec), Trojan-GameThief.Win32.Magania.cegh (Kaspersky), Worm.Win32.Taterf.b (v)