Exploit:Java/Blacole.CC

Exploit:Java/Blacole.CC Description

Type: Trojan

Exploit:Java/Blacole.CC is a hazardous Java Trojan that propagates via security vulnerabilities in the affected PC system and applications installed on it. Exploit:Java/Blacole.CC's free malicious payload is created to fulfill harmful actions on the corrupted PC system. Exploit:Java/Blacole.CC receives commands from remote hackers on how to execute harmful actions. Exploit:Java/Blacole.CC creates and maintains secret connection line that links it in live mode to a remote server so that hackers could assign it with the tasks they find appropriate. Exploit:Java/Blacole.CC can also download and install other malware infections. Uninstall Exploit:Java/Blacole.CC as soon as possible.

Technical Information

File System Details

Exploit:Java/Blacole.CC creates the following file(s):
# File Name Detection Count
1 C:\WINDOWS\system32\svchost.exe N/A
2 C:\Program Files\Java\jre6\bin\jqs.exe N/A
3 C:\Windows\system32\DRIVERS\epfwwfp.sys N/A
4 C:\Windows\system32\DllHost.exe N/A
5 C:\WINDOWS\system32\spoolsv.exe N/A
6 %AppData%\RANDOM CHARACTERS N/A
7 C:\WINDOWS\system32\services.exe_Trojan horse Exploit:Java/Blacole.CC N/A

Registry Details

Exploit:Java/Blacole.CC creates the following registry entry or registry entries:
Registry key
"%windir%\system32\sessmgr.exe"=Exploit:Java/Blacole.CC
"c:\Program Files\Virtual Firefox\firefox.exe"="c:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Chrome\Application\chrome.exe"=
"%windir%\Network Diagnostic\xpnetdiag.exe"=
"c:\Program Files\Bonjour\mDNSResponder.exe"=
HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List
"c:\Program Files\McAfee\\Managed VirusScan\Agent\myAgtSvc.exe"=
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.