Keyword: troj_zbot.alt
50714 Total Search   |   Showing Results : 21 - 40
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/1732010125741.jpeg Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal";
CVE-2008-4193 Stack-based buffer overflow in SecurityGateway.dll in Alt-N Technologies SecurityGateway 1.0.1 allows remote attackers to execute arbitrary code via a long username parameter. Alt-N
CVE-2008-1358 Stack-based buffer overflow in the IMAP server in Alt-N Technologies MDaemon 9.6.4 allows remote authenticated users to execute arbitrary code via a FETCH command with a long BODY.
This potentially unwanted application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This malware is a backdoor with the primary purpose of stealing information from online transactions. The list of the monitored URLs can also be dynamically updated by a cybercriminal. It also has
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It encrypts files
\Stamps\Hand-Drawn\009 Hand-Drawn Quote 1.png %System%\SnagitPortable\App\Snagit\Stamps\Windows Cursors\01 Alt Arrow.png %System%\SnagitPortable\App\Snagit\Stamps\Business\01 Ampersand 1.png %System%
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals certain information from the system and/or
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
CVE-2008-2631 The WordClient interface in Alt-N Technologies MDaemon 9.6.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted HTTP
following: Disables the following keystrokes: alt + tab alt + space ctrl + shift + escape Windows delete control (ctrl) alt Locks the screen using a pornographic image Pops a message box containing one of the
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/31122009122650.jpeg How does this threat get into users' systems? Spammed messages lure users into downloading an electronic game related to the 2009
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/163201055222.jpeg Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal";
This malware is the dropper for the malware BKDR_NELOWEG.DD, a backdoor whose primary purpose is stealing information from online transactions, which is capable of running on Windows Vista and
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain URLs. It may do this to remotely
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan injects codes into its created process, svchost.exe . It attempts to send spammed emails received from remote sites using certain servers. This Trojan may be unknowingly downloaded by a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This