Keyword: irc generic
30597 Total Search   |   Showing Results : 481 - 500
report is generated via an automated analysis system. Trojan:WinNT/Mushka.A (Microsoft); Generic Dropper.acd (McAfee); Trojan.Gen.2 (Symantec); Trojan.Win32.Menti.jfu (Kaspersky); Trojan.Win32.Generic!BT
}am.com/{random path} This report is generated via an automated analysis system. TrojanDownloader:Win32/Small.gen!Z (Microsoft); Generic Downloader.ea (McAfee); Downloader (Symantec);
}.73.220/ASS/images/contas.exe This report is generated via an automated analysis system. Generic Downloader.ab (McAfee); Downloader.Bancos (Symantec); Backdoor.Win32.VB.awd (Kaspersky); Trojan.Win32.Packer.Upack0.3.9 (ep)
This is the Trend Micro generic detection for Trojan malware. A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from
is generated via an automated analysis system. VirTool:Win32/CeeInject.gen!HP (Microsoft); Generic BackDoor.ady (McAfee); Trojan.Win32.Jorik.IRCbot.tfl (Kaspersky); Trojan.Win32.Encpk.ags (v) (Sunbelt
Tomcat 4.1.24,Apache Tomcat 4.1.28,Apache Tomcat 4.1.3,Apache Tomcat 4.1.31,Apache Tomcat 4.1.36 Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
characters} http://{BLOCKED}lume.org/404.php?{random characters} http://{BLOCKED}went.org/404.php?{random characters} Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.ed (McAfee); Trojan.Gen (Symantec);
{BLOCKED}r.cn/download/setupconfig.asp?V=1003&Webid=208 This report is generated via an automated analysis system. Generic Downloader.en (McAfee); Downloader.MisleadApp (Symantec);
via an automated analysis system. TrojanDropper:Win32/Microjoin.gen!C (Microsoft); Generic Dropper!dym (McAfee); Trojan.Gen (Symantec); Trojan-Dropper.Win32.Agent.evqg (Kaspersky);
}9.com/2012.asp This report is generated via an automated analysis system. Generic Downloader.x!fpg (McAfee); Downloader (Symantec); Trojan-Downloader.Win32.Agent.fhkr (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt
}ebspeed.net/html/license_43EC922A3D0E1F403834ED406BA80F5A686E606DF596C71B1F47B22D93555C332C0C0719D7D5C142B8C2C3E65DCC50966E34BA8C4D56463B02F3FED9544A9D2924CF3F64589D6F1433EC75C0BF3ED51DB4E8DD21F1BF90A901085273A000BCFE805167C02A89DFD83C52EF01BB4CC51AFA6753E35E9F31AACF This report is generated via an automated analysis system. TrojanDownloader:Win32/Renos.KC (Microsoft); Generic Downloader.x!fqf (McAfee); Packed.Generic.305
This is the Trend Micro generic detection for Trojan malware. A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from
This report is generated via an automated analysis system. TrojanDropper:Win32/VB.HV (Microsoft); Generic Dropper.xc (McAfee); Trojan.Win32.VBKrypt.hih (Kaspersky); Trojan-Dropper.Win32.VBHV.aa (v)
This is the Trend Micro generic detection for potentially unwanted applications (PUAs) that are installed in your computers or devices. This application is detected as carrying a possible risk of
4.1.24,Apache Tomcat 4.1.28,Apache Tomcat 4.1.3,Apache Tomcat 4.1.31,Apache Tomcat 4.1.36 Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
This is the Trend Micro generic detection for potentially unwanted applications (PUAs) that are installed in your computers or devices. This application is detected as carrying a possible risk of
This report is generated via an automated analysis system. Generic Trojan.i (McAfee); Trojan.Gen.2 (Symantec); Trojan.Win32.Denes.pd (Kaspersky); Troj/Agent-AZLN (Sophos); Trojan.Win32.Generic!BT
Routine This worm connects to any of the following Internet Relay Chat (IRC) servers: {BLOCKED}.us.dal.net It adds an IRC script that automatically sends the following messages to everyone who accesses the
Generic BackDoor!cgu (McAfee); Backdoor.Trojan (Symantec); PAK:UPX, Trojan-Spy.Win32.Delf.bvo (Kaspersky); BehavesLike.Win32.Malware.wsc (mx-v) (Sunbelt); Backdoor:W32/Delf.CEK (FSecure)
following IRC server(s): irc.{BLOCKED}e.com NOTES: This worm drops copies of itself in the following folders used in peer-to-peer networks: {folder path}\kazaa\my shared folder\ {folder path}\kazaa lite\my