Keyword: irc generic
30597 Total Search   |   Showing Results : 361 - 380
This is a Trend Micro generic detection for Microsoft Office Powerpoint documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute
This is a Trend Micro generic detection for Microsoft Office Word documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
This is a Trend Micro generic detection for Microsoft Office Excel documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
This is a Trend Micro generic detection for Microsoft Office Excel documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
Generic FakeAlert.bz (McAfee); Trojan.Win32.FakeAV.llvo (Kaspersky)
This is a Trend Micro generic detection for Microsoft Office Word documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
This is a Trend Micro generic detection for Microsoft Office documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the file.
This is a Trend Micro generic detection for Microsoft Office Powerpoint documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute
This is a Trend Micro generic detection for Microsoft Office Word documents with suspicious Macro script(s). If your Trend Micro product detects a file under this detection name, do not execute the
report is generated via an automated analysis system. Generic BackDoor.u (McAfee); Trojan.Win32.Diple.gaop (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt)
\Software\DC3_FEXEC This report is generated via an automated analysis system. Backdoor:Win32/Fynloski.A (Microsoft); Generic BackDoor.xa (McAfee); Trojan.Klovbot (Symantec); Backdoor.Win32.Fynloski.A (v)
}xel.cl/{random path} This report is generated via an automated analysis system. Generic Downloader.x!gls (McAfee); Trojan.ADH (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
This report is generated via an automated analysis system. VirTool:Win32/VBInject.UG (Microsoft); Generic VB.fq (McAfee); Trojan.ADH.2 (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
\Software\Enigma Protector\ 79961E282FD446F9-2A4120158CDB4409 This report is generated via an automated analysis system. Generic BackDoor!byw (McAfee); PAK:PE_Patch.Enigma (Kaspersky);
This is a Trend Micro generic detection for files with structures that are considered unusual for normal files. If your Trend Micro product detects a file under this detection name, do not execute
certain Asian character sets. Mozilla Firefox 2.0.0.11,Mozilla Seamonkey 1.1.7,Mozilla Thunderbird 2.0.0.11 Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS)
http://full-video-converter.{BLOCKED}ic.jp/universaldownloader-prefetch http://crl.{BLOCKED}ust.com/USERTrustRSACertificationAuthority.crl Generic PUP.x. (McAfee); SMG.Heur!gen, PUA.Softonic (Symantec);
Autostart Technique This backdoor adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Generic Host
spyware sunbelt symantec threatexpert threatfire trendmicro virus wilderssecurity windowsupdate update.microsoft. download.microsoft. NOTES: This backdoor is capable of connecting to a certain IRC server
system folder}{random letter}.exe" Backdoor Routine This backdoor opens the following port(s) where it listens for remote commands: TCP port 6667 It connects to any of the following IRC server(s):