Keyword: possible
495 Total Search   |   Showing Results : 301 - 320
applications ( Windows Live Messenger , mIRC , Skype ), and via USB drives. In an attempt to lure users into clicking links in instant messages, DORKBOT determines the possible language of the affected user and
saves the files it downloads using the following names: %User Temp%\\{random}.TMP - downloaded file %Current%\\{malware name}.sig - possible configuration file (Note: %User Temp% is the current user's
is a DLL. This DLL is also injected to all processes and is responsible for intercepting and logging outgoing network traffic. It targets German banks and possible script injections:
named folders in the Application Data folder (for ZBOT). Modified files, on the other hand, will have a different hash. To confirm a possible infection, update your security software and completely scan
possible configuration or component file that contains its intended routines and send back information such as host name and IP address: http://{malicious site}/kys_allow_get.asp?name=getkys.jpg&hostname=
maximum CPU usage for automatic threads mode (default 75) --safe safe adjust threads and av settings for current CPU --asm=ASM ASM code for cn/2, possible values: auto, none, intel, ryzen. --print-time=N
code for cn/2, possible values: auto, none, intel, ryzen, bulldozer. --print-time=N print hashrate report every N seconds --api-worker-id=ID custom worker-id for API --api-id=ID custom instance ID for
75) --safe safe adjust threads and av settings for current CPU --asm=ASM ASM code for cn/2, possible values: auto, none, intel, ryzen, bulldozer. --print-time=N print hashrate report every N seconds
— ASM code for cn/2, possible values: auto, none, intel, ryzen, bulldozer. --print-time=N — print hashrate report every N seconds --api-port=N — port for the miner API --api-access-token=T — access token
material mother mountain neither night perhaps possible probably safety seperate severa several simple smell special subject sweet system trust window winter TrojanSpy:Win32/Nivdort!rfn (Microsoft); a
for current CPU --asm=ASM ASM code for cn/2, possible values: auto, none, intel, ryzen, bulldozer. --print-time=N print hashrate report every N seconds --api-worker-id=ID custom worker-id for API
Kernel Could Allow Information Disclosure (2839229) Risk Rating: Important This patch addresses a security flaw found in Microsoft Windows. When exploited, this could allow a possible attacker to gather
protect themselves from this attack? Though it does not have any propagation capability nor autostart technique, it is also possible for an attacker to manually install the bot server onto a system or to
%windows% directory is to trick regedit.exe that this is the component that it needs. Therefore, loading the malicious clb.dll into the system. It listens to port 3389/TCP, the port for RCP, for possible
a possible configuration or component file that contains its intended routines and send back information such as host name and IP address: http://{BLOCKED}7s.{BLOCKED}p.net/kys_allow_get.asp?name
downloaded PE file is a DLL. This DLL is also injected to all processes and is responsible for intercepting and logging outgoing network traffic. It targets German banks and possible script injections:
for current CPU --asm=ASM ASM code for cn/2, possible values: auto, none, intel, ryzen, bulldozer. --print-time=N print hashrate report every N seconds --api-worker-id=ID custom worker-id for API
code for cn/2, possible values: auto, none, intel, ryzen, bulldozer. --print-time=N print hashrate report every N seconds --api-worker-id=ID custom worker-id for API --api-id=ID custom instance ID for
code for cn/2, possible values: auto, none, intel, ryzen, bulldozer. --print-time=N print hashrate report every N seconds --api-worker-id=ID custom worker-id for API --api-id=ID custom instance ID for
email to a target system - Get OS name and version, system uptime, current process name, user ID, group ID and current directory cleartmp - Delete all files in /tmp rootable - Enumerates possible root