Keyword: usojan.perl.malxmr.uwejs2
40467 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan may be downloaded by other malware/grayware from remote sites. It deletes itself after execution. Arrival Details This Trojan may be downloaded by the following malware/grayware from
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
affected system's memory: perl sparky.sh pscan2 Information Theft This Trojan gathers the following account information: User Name System Date and Time Current Working Directory Number of Processing Units
threads -v, --av=N algorithm variation, 0 auto select --cpu-affinity set process affinity to CPU core(s), mask 0x3 for cores 0 and 1 --cpu-priority set process priority (0 idle, 2 normal to 5 highest)
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Root%\Documents and Settings\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\Capture\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\DBD\Gofer\70ef97a470ef9043516.lock %System Root%\Perl\html
Root%\Perl\bin\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\Eval\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\Module\Load\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\ExtUtils
CVE-2007-1349 PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to
\PDFCreator\PlugIns\pdfforge %Program Files%\PDFCreator\COM %Program Files%\PDFCreator\GS9.04\gs9.04\Bin %Program Files%\PDFCreator\COM\Perl %Program Files%\PDFCreator\COM\Windows Scripting Host\JScripts
Scripts\How To\PdfSignatureSettings.js %Program Files%\PDFCreator\COM Scripts\Perl\BackgroundPage.pl %Program Files%\PDFCreator\COM Scripts\Perl\CoverPage.pl %Program Files%\PDFCreator\COM Scripts\Perl
allows remote attackers to inject arbitrary web script or HTML via the URI. Apache Mod Perl 2,Apache Mod Perl 1 Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS)
Root%\Perl\html\lib\File\HomeDir\Darwin\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\Hash\Util\70ef97a470ef9043516.lock %System Root%\Perl\html\lib\Perl\Critic\Policy\70ef97a470ef9043516.lock
Files%\PDFCreator\COM\MS Office %Program Files%\PDFCreator\COM\Perl %Program Files%\PDFCreator\COM\Python %Program Files%\PDFCreator\COM\Ruby %Program Files%\PDFCreator\COM\VB6 %Program Files%\PDFCreator
This malware figures in a Shellshock-related SMTP attack. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This Backdoor arrives on a
!killall - Terminate all Perl processes !reset - Reconnect to IRC server !jo - Join a channel !part - Leave a channel !nick - Change nickname !pid - Send fake process name and process ID ! - Execute a shell
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor is downloaded and installed in systems via malicious URL. It is installed with a miner. This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Coinminer arrives on a system as