Search
Keyword: ms
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\SafeBoot\Minimal\ Ms IAP Service HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\SafeBoot\Network\ Ms IAP Service HKEY_LOCAL_MACHINE\Software\DsClientRSvr It
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run MS Service Manager = "%User Temp%\idemoodp0cetka.exe" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run MS Service Manager = "%User Temp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run MS Service Manager = "%User Temp%\idemoodp0cetka.exe" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run MS Service Manager = "%User Temp
\Software\Microsoft\ MS Setup (ACME)\User Info LogData in = "True" HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Desktop\General Wallpaper = "%System Root%\Jon.html" It adds the following registry
Description Name: Identified CBC Based Cipher Suite In SSLv3 Request .
on analysis of the codes, it has the following capabilities: This is a tool used to get passwords stored on a system machine, such as MS Outlook passwords, AutoComplete passwords and Password-protected
Description Name: CVE-2016-3081 - Remote Code Execution - HTTP (Request) . This is the Trend Micro detection for malicious HTTP network packet
1004339| 1004339 - MS Internet Explorer Uninitialized Memory Corruption Vulnerability
vbc.exe Information Theft This spyware attempts to steal stored email credentials from the following: Eudora Gmail Google Desktop Group Mail Free Hotmail/MSN IncrediMail MS Outlook MS Outlook 2002/2003/2007
QUERVAR is a malware family of file infectors that infects files such as MS Word, MS Excel, and executable files. It then changes the file extension of infected files to .SCR while retaining the same
QUERVAR is a malware family of file infectors that infects files such as MS Word, MS Excel, and executable files. It then changes the file extension of infected files to .SCR while retaining the same
.png, .bmp, .jpg ) Media Files (.mp3, .wma) MS Office Files (.doc, .xls, .ppt, .mdb) Program Application Files (.exe) This ransomware also connects to URLs and IP addresses to send and receive
CVE-2012-1888 Microsoft issues a patch for a remote code execution vulnerability that exists in the way certain versions of MS Visio parses specially crafted files. Attackers looking to exploit this
with malware attachments in the form of a malicious MS Excel macro. Both are detected as variants of X2KM_LOCKY and X2KM_DLOADR. Spam filtering helps block these kinds of emails. Users are advised to
CVE-2012-2524 Microsoft issues a patch that resolves a remote code execution vulnerability existing in several versions of MS Office . Attackers looking to exploit this vulnerability may create
its installation routine: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run MS Installer Interface = "\Windows\Explorer.exe" HKEY_CURRENT_USER\Software\Win7zip Uuid = {hex value}
Description Name: CVE-2015-5374 - SIEMENS SIPROTECT DENIAL OF SERVICE - UDP (Request) . This is the Trend Micro detection for malicious N/A network packet
Description Name: CVE-2016-2776 DNS ISC BIND TSIG EXPLOIT - DNS (Request) .
files on MS Vista. Usage: {malware name} {absolute path to license file} Returns: 0 - success, 1 - failure
The said MS Outlook should be connected to an Exchange server with Online Mode in order to be vulnerable. In addition, this vulnerability also gives an attacker user rights to the system. Microsoft