Keyword: irc generic
30597 Total Search   |   Showing Results : 621 - 640
not infect files with certain characteristics. It also searches for target script files for iframe infection. Infected script files are detected as HTML_IFRAME.SMV. It connects to certain IRC servers
analysis system. Backdoor:Win32/IRCbot.gen!Z (Microsoft); Generic PWS.y (McAfee); W32.Spybot.Worm (Symantec); Backdoor.Win32.Rbot.kms (Kaspersky); Trojan.Win32.Generic.pak!cobra (Sunbelt); Trojan horse
after execution. This report is generated via an automated analysis system. VirTool:Win32/Obfuscator.ZG, VirTool:Win32/Obfuscator.ZG (Microsoft); Generic BackDoor.aca (McAfee); Backdoor.Win32.Simda.a (v)
}a-feeds.com/{random path} http://{BLOCKED}pdates.com/{random path} This report is generated via an automated analysis system. Trojan:Win32/WinSpywareProtect (Microsoft); Generic Packed.a (McAfee);
\AppDataLow Trojan Horse (Symantec); Trojan:Win32/Orsam!rts (Microsoft); Backdoor.Win32.Papras.den (Kaspersky); Generic BackDoor!dkd (Mcafee); Mal/PWS-II (Sophos)
automated analysis system. TrojanDownloader:Win32/Kuluoz.B (Microsoft); Generic Downloader.z (McAfee); Trojan.Fakeavlock (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-3059 to allow remote attackers to execute arbitrary commands in the affected
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-3431 to allow remote attackers to execute arbitrary commands in the affected
main component to successfully perform its intended routine. TrojanDropper:Win32/Boaxxe.G [Microsoft], Generic Dropper.fz [Mcafee]
This is a Trend Micro generic detection for specially crafted Microsoft Office documents that exploits CVE-2006-3059 to allow remote attackers to execute arbitrary commands in the affected system.
This is a Trend Micro generic detection for specially crafted Microsoft Office documents that exploits CVE-2006-1540 to allow remote attackers to execute arbitrary commands in the affected system.
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-1308 to allow remote attackers to execute arbitrary commands in the affected
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-1309 to allow remote attackers to execute arbitrary commands in the affected
This is a Trend Micro generic detection for specially crafted Microsoft Office Word documents that exploits CVE-2006-2492 to allow remote attackers to execute arbitrary commands in the affected
This is the Trend Micro generic detection for Flash files with ActionsScript that exploits CVE-2007-0071 to enable remote attackers to execute arbitrary commands on the affected system. Visit the
This is the Trend Micro generic detection for Flash files with ActionsScript that exploit CVE-2009-1862 to enable remote attackers to execute arbitrary commands on the affected system. Visit the
}inumiden.com/up.php?{random characters} http://{BLOCKED}berot.com/up.php?{random characters} NOTES: This is a component of a FAKEAV malware. Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.bz (McAfee);
Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.bz (McAfee); Trojan.Win32.FakeAV.lixx (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Trojan.Generic.7343299 (FSecure)
drops the following files: /antrax10 This report is generated via an automated analysis system. Trojan:Win32/Bumat!rts (Microsoft); Generic Dropper!1dx (McAfee); Trojan.Gen (Symantec); ARC:PEBundle, [0407
report is generated via an automated analysis system. Trojan:Win32/Camec.D (Microsoft); Generic PWS.wb (McAfee); Trojan.Win32.Generic.pak!cobra (Sunbelt); Gen:Trojan.Heur.fm0@szCD5hniX (FSecure)