Keyword: irc generic
30586 Total Search   |   Showing Results : 921 - 940
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Trojan:Win32/EyeStye.N (Microsoft); Generic
Generic PWS.y!dp3 (McAfee); Trojan-Spy.Win32.SpyEyes.plb (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt); Suspicious:W32/Malware!Gemini (FSecure)
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Trojan:Win32/EyeStye.N (Microsoft); Generic
Generic BackDoor.rz (McAfee); Trojan.FakeAV!gen71 (Symantec); Trojan-Spy.Win32.SpyEyes.zyz (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt)
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Generic BackDoor.rz (McAfee); Trojan.FakeAV
=0221811161670D133B http://www.{BLOCKED}an.ddns.us:443/wavdg.php?id=0249731161670D133B This report is generated via an automated analysis system. Backdoor:Win32/Simbot.gen (Microsoft); Generic BackDoor!dzb (McAfee);
Generic PWS.y!xh (McAfee); Infostealer.Bancos (Symantec); Trojan.Win32.Generic.pak!cobra (Sunbelt); Trojan horse PSW.Generic6.AXZI (AVG)
%System% is the Windows system folder, which is usually C:\Windows\System32.) This report is generated via an automated analysis system. PWS:Win32/OnLineGames.FT (Microsoft); Generic Dropper.eb
system. TrojanDropper:Win32/Bifrose.F (Microsoft); Generic VB.fs (McAfee); Backdoor.Bifrose (Symantec); Trojan.Win32.Refroso.ejge, Trojan.Win32.Refroso.ejge (Kaspersky); Trojan.Win32.Bifrose.smi (v)
TrojanDownloader:Win32/Small.gen!AQ (Microsoft); Generic Downloader.x!fwv (McAfee); Downloader (Symantec); Trojan-Downloader.Win32.Agent.eopq, Trojan-Downloader.Win32.Agent.eopq (Kaspersky); Trojan-Downloader.Win32.Small (Sunbelt);
(Microsoft); Generic Malware.mn (McAfee); Backdoor.Tidserv!gen15 (Symantec); Trojan.Win32.Generic!BT (Sunbelt); Trojan.Generic.KD.124293 (FSecure)
an automated analysis system. Trojan:Win32/Swisyn (Microsoft); Generic VB.fu (McAfee); W32.Gosys (Symantec); Trojan.Win32.Swisyn.bwfd, Trojan.Win32.Swisyn.bwfd (Kaspersky); Trojan.Win32.Generic.pak
Root% is the root folder, which is usually C:\. It is also where the operating system is located.) This report is generated via an automated analysis system. Trojan:Win32/VB.ABU (Microsoft); Generic
(Symantec); Generic PUA PE (PUA) (Sophos); RDN/Generic PUP.z (McAfee);
TrojanSpy:Win32/Vwealer.KZ (Microsoft); Generic PWS.g (McAfee); W32.SillyWNSE (Symantec); Email-Worm.Win32.VB.cb, Email-Worm.Win32.VB.cb (Kaspersky); Trojan.Win32.Generic.pak!cobra (Sunbelt); Trojan.Spy.Agent.NKG (FSecure)
Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
Description Name: CVE-2017-9798 - APACHE OPTIONSBLEED Vulnerability - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Intelligence Gathering.The host exhibiting this type...
Description Name: EMPIRE - HTTP (Request) - Variant 3 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Command and Control Communication.The host exhibiting this type of network behavior ...
Vulnerability (CVE-2012-1858) 12-Jul-12 YES CVE-2012-1859 1000552 Generic Cross Site Scripting (XSS) Prevention 18-Jul-06 NO CVE-2012-1859 1000552 Generic Cross Site Scripting (XSS) Prevention 18-Jul-06 NO