Keyword: irc generic
30597 Total Search   |   Showing Results : 921 - 940
(Microsoft); Generic trojan.i (McAfee); Trojan-PSW.Win32.Fareit.azft (Kaspersky); Troj/DwnLdr-MPM (Sophos); Win32.Malware!Drop (Sunbelt); Trojan horse Zbot.ADNB (AVG)
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Trojan:Win32/EyeStye.N (Microsoft); Generic
Generic PWS.y!dp3 (McAfee); Trojan-Spy.Win32.SpyEyes.plb (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Suspicious:W32/Malware!Gemini (FSecure)
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Trojan:Win32/EyeStye.N (Microsoft); Generic
Generic BackDoor.rz (McAfee); Trojan.FakeAV!gen71 (Symantec); Trojan-Spy.Win32.SpyEyes.zyz (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt)
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Generic BackDoor.rz (McAfee); Trojan.FakeAV
=0221811161670D133B http://www.{BLOCKED}an.ddns.us:443/wavdg.php?id=0249731161670D133B This report is generated via an automated analysis system. Backdoor:Win32/Simbot.gen (Microsoft); Generic BackDoor!dzb (McAfee);
Generic PWS.y!xh (McAfee); Infostealer.Bancos (Symantec); Trojan.Win32.Generic.pak!cobra (Sunbelt); Trojan horse PSW.Generic6.AXZI (AVG)
%System% is the Windows system folder, which is usually C:\Windows\System32.) This report is generated via an automated analysis system. PWS:Win32/OnLineGames.FT (Microsoft); Generic Dropper.eb
system. TrojanDropper:Win32/Bifrose.F (Microsoft); Generic VB.fs (McAfee); Backdoor.Bifrose (Symantec); Trojan.Win32.Refroso.ejge, Trojan.Win32.Refroso.ejge (Kaspersky); Trojan.Win32.Bifrose.smi (v)
TrojanDownloader:Win32/Small.gen!AQ (Microsoft); Generic Downloader.x!fwv (McAfee); Downloader (Symantec); Trojan-Downloader.Win32.Agent.eopq, Trojan-Downloader.Win32.Agent.eopq (Kaspersky); Trojan-Downloader.Win32.Small (Sunbelt);
(Microsoft); Generic Malware.mn (McAfee); Backdoor.Tidserv!gen15 (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Trojan.Generic.KD.124293 (FSecure)
an automated analysis system. Trojan:Win32/Swisyn (Microsoft); Generic VB.fu (McAfee); W32.Gosys (Symantec); Trojan.Win32.Swisyn.bwfd, Trojan.Win32.Swisyn.bwfd (Kaspersky); Trojan.Win32.Generic.pak
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Trojan:Win32/VB.ABU (Microsoft); Generic
(Symantec); Generic PUA PE (PUA) (Sophos); RDN/Generic PUP.z (McAfee);
TrojanSpy:Win32/Vwealer.KZ (Microsoft); Generic PWS.g (McAfee); W32.SillyWNSE (Symantec); Email-Worm.Win32.VB.cb, Email-Worm.Win32.VB.cb (Kaspersky); Trojan.Win32.Generic.pak!cobra (Sunbelt); Trojan.Spy.Agent.NKG (FSecure)
Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
Description Name: CVE-2017-9798 - APACHE OPTIONSBLEED Vulnerability - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Intelligence Gathering.The host exhibiting this type...
Description Name: EMPIRE - HTTP (Request) - Variant 3 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Command and Control Communication.The host exhibiting this type of network behavior ...