Keyword: elfrootkitc2
40270 Total Search   |   Showing Results : 601 - 620
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
following copies of itself into the affected system: %System Root%\system32\891249\154\2\4\52\34\5\5\2\34\5\234\5234\523452345\234\52345\23462\362\34\6523\452\346\234\52\345\24\624\36\234\62\346\2346\23\46
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
CVE-2002-1337 Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as
CVE-2010-1870 The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
\ Advanced Hidden1 = 2 HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Control\Session Manager PendingFileRenameOperations = ""\??\%Windows%\rhnkzu.vbs,\??\%Common Startup%\hxddyn.vbs"" HKEY_LOCAL_MACHINE\SYSTEM
\security_system about = "2" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\0 2001 = "0" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings\ Zones\0
\BMenuPlg.dll" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\SharedDlls %System%\BMenuPlg.dll = "2" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Installer\ UserData\S-1-5-18
\Context2pro\ contextprod\Validation 2 = "1f8b574afeec92a16e7199a8b33de6de" HKEY_CURRENT_USER\Software\Context2pro\ contextprod\CurrentPackage RemainTime = "0" HKEY_CURRENT_USER\Software\Context2pro\ contextprod
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
Trojan adds the following scheduled tasks: Name: blackball Triggers: One Time, repeat every 2 hours indefinitely Action: Start a program - blackball Name: UOZzaSy3iqH Triggers: One Time, repeat every 1
CVE-2012-0168,CVE-2012-0169,CVE-2012-0170,CVE-2012-0171,CVE-2012-0172 This security update resolves several reported vulnerabilities found in Internet Explorer 6, 7, 8, and 9. Any of the said