Search
Keyword: irc generic
report is generated via an automated analysis system. TrojanDropper:Win32/Festi.C (Microsoft); Generic Dropper!1nv (McAfee); Trojan.Win32.Biscker (v) (Sunbelt); Gen:Heur.Kelios.1 (FSecure)
{BLOCKED}a.pl/showthread.php?t=162537 This report is generated via an automated analysis system. Generic Downloader.mo (McAfee); Trojan.Win32.Generic.pak!cobra (Sunbelt)
This report is generated via an automated analysis system. Generic VB.fl (McAfee); Trojan.ADH.2 (Symantec); PAK:PE_Patch, PAK:ASProtect (Kaspersky); ERROR (Sunbelt); Gen:Trojan.Heur.VP2.ouvbaabRZkgi
}950.it/632458.html This report is generated via an automated analysis system. TrojanDownloader:Win32/Karagany.I (Microsoft); Generic Downloader.g (McAfee); Downloader.Parshell (Symantec); Trojan.Win32.Generic!BT
}haiger.de/482766.html This report is generated via an automated analysis system. TrojanDownloader:Win32/Karagany.I (Microsoft); Generic Downloader.z (McAfee); Downloader.Parshell (Symantec); Trojan.Win32.Generic!BT
report is generated via an automated analysis system. Generic VB.b (McAfee); Trojan.Gen.2 (Symantec); Trojan-Spy.Win32.Agent.cbua, Trojan-Spy.Win32.Agent.cbua (Kaspersky);
This report is generated via an automated analysis system. TrojanDownloader:Win32/Pher.A (Microsoft); Generic Downloader.x!exg (McAfee); Trojan-Downloader.Win32.Pher.hww (Kaspersky);
}950.it/522979.html This report is generated via an automated analysis system. TrojanDownloader:Win32/Karagany.I (Microsoft); Generic Downloader.z (McAfee); Downloader.Parshell (Symantec); Trojan.Win32.Generic!BT
This is a Trend Micro generic detection for Microsoft Office Word documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
Generic FakeAlert.bz (McAfee); Trojan.Win32.FakeAV.llvo (Kaspersky)
This is a Trend Micro generic detection for Microsoft Office Word documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
report is generated via an automated analysis system. Generic BackDoor.u (McAfee); Trojan.Win32.Diple.gaop (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt)
\Software\DC3_FEXEC This report is generated via an automated analysis system. Backdoor:Win32/Fynloski.A (Microsoft); Generic BackDoor.xa (McAfee); Trojan.Klovbot (Symantec); Backdoor.Win32.Fynloski.A (v)
}xel.cl/{random path} This report is generated via an automated analysis system. Generic Downloader.x!gls (McAfee); Trojan.ADH (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
certain Asian character sets. Mozilla Firefox 2.0.0.11,Mozilla Seamonkey 1.1.7,Mozilla Thunderbird 2.0.0.11 Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS)
This is a Trend Micro generic detection for files with structures that are considered unusual for normal files. If your Trend Micro product detects a file under this detection name, do not execute
http://full-video-converter.{BLOCKED}ic.jp/universaldownloader-prefetch http://crl.{BLOCKED}ust.com/USERTrustRSACertificationAuthority.crl Generic PUP.x. (McAfee); SMG.Heur!gen, PUA.Softonic (Symantec);
Autostart Technique This backdoor adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Generic Host
\command=OGa\RD\GOx.exe shell\open\default=1 Backdoor Routine This worm connects to any of the following IRC server(s): sik.{BLOCKED}nix.net idem0.{BLOCKED}k.eu ogardf.{BLOCKED}ils.net ogardf.{BLOCKED}rk.biz
Routine This worm joins any of the following IRC channel(s): #rxbot_paradise It executes the following command(s) from a remote malicious user: Create and delete files Download file from the Internet