Keyword: irc generic
30596 Total Search   |   Showing Results : 741 - 760
This is the Trend Micro generic detection for Flash files with ActionsScript that exploits CVE-2007-0071 to enable remote attackers to execute arbitrary commands on the affected system. Visit the
automated analysis system. TrojanDownloader:Win32/Kuluoz.B (Microsoft); Generic Downloader.z (McAfee); Trojan.Fakeavlock (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
}inumiden.com/up.php?{random characters} http://{BLOCKED}berot.com/up.php?{random characters} NOTES: This is a component of a FAKEAV malware. Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.bz (McAfee);
Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.bz (McAfee); Trojan.Win32.FakeAV.lixx (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Trojan.Generic.7343299 (FSecure)
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2006-1308 to allow remote attackers to execute arbitrary commands in the affected
This is a Trend Micro generic detection for specially crafted Microsoft Office Word documents that exploits CVE-2006-2492 to allow remote attackers to execute arbitrary commands in the affected
(Microsoft); Generic Downloader.x!fhs (McAfee); Downloader (Symantec); Trojan-Downloader.Win32.Fosniw.ue (Kaspersky); Trojan-Downloader.Win32.Fosniw.b (v) (Sunbelt); Trojan.Generic.5974945 (FSecure)
%Windows% is the Windows folder, which is usually C:\Windows.) This report is generated via an automated analysis system. TrojanDownloader:Win32/Aecofil.A (Microsoft); Generic VB.i (McAfee); Downloader
Generic Downloader.hc (McAfee); Trojan.Gen.2 (Symantec); Trojan-Downloader.Win32.Agent.tbfe, Backdoor.Win32.Sinowal.odq (Kaspersky); Trojan-Dropper.Win32.Sinowal.y (v) (Sunbelt)
=0308181161670D1426 This report is generated via an automated analysis system. Backdoor:Win32/Simbot.gen (Microsoft); Generic BackDoor!fdr (McAfee); Trojan Horse (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
after execution. This report is generated via an automated analysis system. VirTool:Win32/Obfuscator.ZG, VirTool:Win32/Obfuscator.ZG (Microsoft); Generic BackDoor.aca (McAfee); Backdoor.Win32.Simda.a (v)
Trojan:Win32/Ordpea.A, Trojan:Win32/Ordpea.A (Microsoft); Generic Downloader.ez (McAfee); Trojan Horse (Symantec); Trojan.Win32.Agent.abzlz (Sunbelt)
=0203871161670D1391 This report is generated via an automated analysis system. Backdoor:Win32/Simbot.gen (Microsoft); Generic BackDoor!fdr (McAfee); Trojan.Gen.2 (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
after execution. This report is generated via an automated analysis system. Backdoor:Win32/Simda (Microsoft); Generic BackDoor.abu (McAfee); Backdoor.Win32.Simda.a (v) (Sunbelt)
malicious URL: http://wordpress.{BLOCKED}on.com/wp-content/plugins/123.txt {BLOCKED}0.1 {BLOCKED}2.106.165 It deletes itself after execution. This report is generated via an automated analysis system. Generic
malicious URL: {random IP addresses} Trojan:Win32/Malagent (Microsoft), Trojan-PSW.Win32.Tepfer.eqwe, Generic BackDoor.afz (McAfee)
the Windows system folder, which is usually C:\Windows\System32.) This report is generated via an automated analysis system. Backdoor:Win32/Hostil.gen!A (Microsoft); Generic BackDoor!dqs (McAfee);
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Generic Downloader.x!ggj (McAfee);
}8.117.106/loader.php?l=0409&adv=23 This report is generated via an automated analysis system. TrojanDownloader:Win32/Bredolab.A (Microsoft); Generic Downloader.ab (McAfee); Downloader (Symantec);
using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention