Keyword: irc generic
30586 Total Search   |   Showing Results : 881 - 900
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Generic Downloader.x!ggm (McAfee); Trojan
\temp.txt (Note: %Program Files% is the default Program Files folder, usually C:\Program Files.) This report is generated via an automated analysis system. Trojan:Win32/Bumat!rts (Microsoft); Generic
}eme.biz/progs_traff/ainltj/ksnvufr.php This report is generated via an automated analysis system. TrojanSpy:Win32/Harnig.gen!rpf (Microsoft); Generic Downloader.bl (McAfee); Downloader.Harnig (Symantec); PAK:FSG, Packed.Win32.Tibs
TrojanSpy:Win32/Mafod!rts (Microsoft); Generic Downloader.il (McAfee); Infostealer.Bancos (Symantec); PAK:PE_Patch, PAK:NTKrnl, Trojan-Downloader.Win32.Banload.bovi (Kaspersky); Trojan.Win32.Packer.NTkrnl0.1 (ep)
TrojanDownloader:Win32/Chepvil.J (Microsoft); Generic Downloader.x!fed (McAfee); Trojan.FakeAV (Symantec); Trojan-Downloader.Win32.Deliver.aw (Kaspersky); TrojanDownloader.Win32.Chepvil.j (v) (Sunbelt); Trojan.Generic.5783352
Worm:Win32/RJump (Microsoft); Generic Malware.eb (McAfee); Trojan Horse (Symantec); Trojan.Win32.Agent.abt (Kaspersky); Trojan.Win32.Agent.abt (v) (Sunbelt); Trojan.Agent.AEI (FSecure)
\spoolv.exe (Note: %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.) This report is generated via an automated analysis system. Exploit:Win32/MS08067 (Microsoft); Generic Dropper!1ab
TrojanDropper:Win32/Brepit.A (Microsoft); Generic PWS.ak (McAfee); Trojan.Dropper (Symantec); Trojan.Win32.Pincav.bkgx (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Trojan.Generic.6521896 (FSecure)
after execution. This report is generated via an automated analysis system. VirTool:Win32/Obfuscator.AAH (Microsoft); Generic BackDoor.acs (McAfee); Backdoor.Win32.Simda.anm (Kaspersky);
automated analysis system. TrojanDownloader:Win32/Kuluoz.B (Microsoft); Generic BackDoor.adp (McAfee); Trojan.Gen (Symantec); Trojan-Downloader.Win32.Kuluoz.ar (Kaspersky); Lookslike.Win32.Cbeplay.p (v)
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Trojan:Win32/EyeStye.N (Microsoft); Generic
This report is generated via an automated analysis system. Generic StartPage!bbw (McAfee); Trojan.Startpage (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Trojan.Generic.7032482 (FSecure)
path} This report is generated via an automated analysis system. TrojanDownloader:Win32/Kuluoz.B (Microsoft); Generic BackDoor.adp (McAfee); Trojan.Gen (Symantec); Trojan.Win32.Generic.pak!cobra (Sunbelt
generated via an automated analysis system. Trojan:Win32/Tobfy (Microsoft); Generic Dropper!1yc (McAfee); W32.Voterai (Symantec); Trojan.Win32.Generic.pak!cobra (Sunbelt)
}figh.com/up.php?{random characters} http://{BLOCKED}adunive.com/up.php?{random characters} Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.bz (McAfee); Trojan.Gen.2 (Symantec); Trojan.Win32.Generic!BT
}cifica.com/up.php?{random characters} Trojan:Win32/FakeSysdef (Microsoft); Generic FakeAlert.bz (McAfee); Trojan.FakeAV (Symantec); Trojan.Win32.FakeAV.lnac (Kaspersky); ERROR (Sunbelt); Trojan.Generic.KDV.580216
{malware path and file name}" This report is generated via an automated analysis system. Generic PWS.y!1kx (McAfee); Trojan.Gen (Symantec); Trojan.Win32.Generic!BT (Sunbelt)
This is a Trend Micro generic detection for specially crafted Microsoft Office Excel documents that exploits CVE-2012-0158 to allow remote attackers to execute arbitrary commands in the affected
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Trojan:Win32/Meredrop (Microsoft); Generic
Generic PWS.y!drn (McAfee); Trojan.Gen (Symantec); Trojan-Spy.Win32.SpyEyes.zhi (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt)