Search
Keyword: irc generic
after execution. This report is generated via an automated analysis system. Backdoor:Win32/Simda (Microsoft); Generic BackDoor.acr (McAfee); Backdoor.Win32.Simda.a (v) (Sunbelt)
\Software\Microsoft\ Windows VRSIN = "1218444431" HKEY_CURRENT_USER\Software\Microsoft\ Windows AIM = "0000000000004683" This report is generated via an automated analysis system. Generic FakeAlert.a (McAfee
backdoor deletes itself after execution. This report is generated via an automated analysis system. Backdoor:Win32/Simda (Microsoft); Generic BackDoor.abu (McAfee); Backdoor.Trojan (Symantec);
after execution. This report is generated via an automated analysis system. VirTool:Win32/Obfuscator.ZG, VirTool:Win32/Obfuscator.ZG (Microsoft); Generic BackDoor.aca (McAfee); Backdoor.Win32.Simda.a (v)
after execution. This report is generated via an automated analysis system. Backdoor:Win32/Simda.gen!E (Microsoft); Generic BackDoor.aca (McAfee); Backdoor.Win32.Simda.a (v) (Sunbelt)
}gysdihfvnfgasd.comsearcho?{random characters} http://{BLOCKED}jbsbvmve.comsearcho?{random characters} This report is generated via an automated analysis system. PWS:Win32/Sinowal.gen!AA (Microsoft); Generic BackDoor.ta
}t-upddateme.com/{random path} http://{BLOCKED}pdates.com/{random path} This report is generated via an automated analysis system. Trojan:Win32/WinSpywareProtect (Microsoft); Generic Packed.a (McAfee); Trojan.FakeAV
after execution. This report is generated via an automated analysis system. Backdoor:Win32/Simda (Microsoft); Generic BackDoor.acr (McAfee); Backdoor.Win32.Simda.a (v) (Sunbelt)
TrojanDownloader:Win32/Troxen!rts (Microsoft); Generic Downloader.z (McAfee); Downloader (Symantec); Trojan.Win32.Agent.abzlz (Sunbelt)
This is a Trend Micro generic detection for specially crafted Microsoft Office documents that exploits CVE-2006-0009 to allow remote attackers to execute arbitrary commands in the affected system.
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-1304 to allow remote attackers to execute arbitrary commands in the affected
Exploit:Java/CVE-2010-0840.FW (Microsoft); Exploit.Java.CVE-2010-0840.bz (Kaspersky); Generic Exploit!by (McAfee)
perform its intended routine. Backdoor.Trojan (Symantec); Backdoor.Win32.Papras.api (Kaspersky); Generic BackDoor!dae (Mcafee)
application requires its main component to successfully perform its intended routine. Generic PUA JP (Sophos); Win32.Trojan.Agent.Tafl (Tencent); Win32.SuspectCrc (Ikarus)
Trojan Horse(Symantec), Mal/Generic-A(Sophos), Trojan-Dropper.Win32.VB.afc(Kaspersky), TR/Dropper.Gen(Avira), W32/DropperX.JPO (exact(F-Prot), Generic Dropper(McAfee)
drops the following files: %WinDir%\Server.exe %WinDir%\Zenyth AV Tool.exe This report is generated via an automated analysis system. TrojanDropper:Win32/Amighelo.A (Microsoft); Generic Dropper.id (McAfee
the Windows folder, which is usually C:\Windows.) This report is generated via an automated analysis system. Worm:Win32/VB.WB (Microsoft); Generic Downloader.z (McAfee); Trojan Horse (Symantec);
}8.117.106/loader.php?l=0409&adv=23 This report is generated via an automated analysis system. TrojanDownloader:Win32/Bredolab.A (Microsoft); Generic Downloader.ab (McAfee); Downloader (Symantec);
Windows Temporary folder, which is usually C:\Windows\Temp.) This report is generated via an automated analysis system. TrojanDownloader:Win32/Waledac.R (Microsoft); Generic BackDoor.aej (McAfee);
malicious URL: http://wordpress.{BLOCKED}on.com/wp-content/plugins/123.txt {BLOCKED}0.1 {BLOCKED}2.106.165 It deletes itself after execution. This report is generated via an automated analysis system. Generic