Search
Keyword: ms
\ Windows\CurrentVersion\Explorer\ Advanced HideFileExt = 1 (Note: The default value data of the said registry entry is 0 .) File Infection This file infector infects the following file types: MS Office Files
\SwPvc DisplayName = "MS Software Shadow Provider" HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Services\SwPvc ObjectName = "LocalSystem" HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Services\SwPvc
from attacks using these vulnerabilities. MS Bulletin ID Vulnerability ID DPI Rule Number DPI Rule Name Release Date IDF Compatibility MS13-021 CVE-2013-0087 1005411 Microsoft Internet Explorer OnResize
ALFTP MS IE FTP DeluxeFTP Staff-FTP Global Downloader FreshFTP BlazeFtp FTP++ GoFTP 3D-FTP EasyFTP XFtp FTP Now Robo-FTP Linas FTP PuTTy NppFTP NexusFile Winzip My FTP NovaFTP FastTrack Cyberduck It
web, MS Office, video, images, script, text, and other non-binary files. Spammed via email, Downloaded from the Internet Connects to URLs/IPs
explorer and redirects to https://www.{BLOCKED}li.com/video/av61335515/ Displays an error trail that follow the user's cursor for 10 ms Deletes CXK-NMSL.bat after execution The ransomware appends .cxkdata to
Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. MS Bulletin ID Vulnerability ID DPI Rule Number DPI Rule Name Release Date Vulnerability and IDF Compatibility MS14-022
Vulnerability Protection product or OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. MS Bulletin ID Vulnerability ID DPI Rule Number DPI Rule
protected from attacks using these vulnerabilities. MS Bulletin ID Vulnerability ID DPI Rule Number DPI Rule Name Release Date IDF Compatibility MS13-059 CVE-2013-3184 1005629 Internet Explorer Memory
(64-bit) and 10(64-bit).) Other System Modifications This Trojan Spy deletes the following files: %Windows%\Tasks\Ms Cloud Disk.job %Windows%\LastGood.Tmp (Note: %Windows% is the Windows folder, where it
vulnerable system. CVE-2019-1060 - MS XML Remote Code Execution Vulnerability Risk Rating: Critical This remote code execution vulnerability exists in the improper parsing of user input by the Microsoft XML
GoFTP Ipswitch WS_FTP LeapWare LeapFTP LeechFTP LinasFTP MAS-Soft FTPInfo MS IE FTP Passwords NCH Software ClassicFTP NovaFTP Robo-FTP 3.7 SmartFTP SoftX.org FTPClient Staff-FTP TurboFTP WS_FTP WinFTP Ftp
LeapWare LeapFTP LeechFTP LinasFTP MAS-Soft FTPInfo MS IE FTP Passwords NCH Software ClassicFTP NovaFTP Robo-FTP 3.7 SmartFTP SoftX.org FTPClient Staff-FTP TurboFTP WS_FTP WinFTP Ftp Winzip (Nico Mak
GlobalSCAPE CuteFTP 7 Home GlobalSCAPE CuteFTP 7 Professional GlobalSCAPE CuteFTP 8 Home GlobalSCAPE CuteFTP 8 Professional GoFTP Ipswitch WS_FTP LeapWare LeapFTP LeechFTP LinasFTP MAS-Soft FTPInfo MS IE FTP
GlobalSCAPE CuteFTP 8 Professional GlobalSCAPE CuteFTP 7 Home GoFTP Ipswitch WS_FTP LeapWare LeapFTP LeechFTP LinasFTP MAS-Soft FTPInfo MS IE FTP Passwords NCH Software ClassicFTP NovaFTP PuTTY Robo-FTP 3.7
LeechFTP LinasFTP MAS-Soft FTPInfo MS IE FTP Passwords NCH Software ClassicFTP NovaFTP PuTTY Robo-FTP 3.7 SmartFTP SoftX.org FTPClient Staff-FTP TurboFTP WS_FTP WinFTP salt-ftp It gathers the following
GlobalSCAPE CuteFTP 7 Professional GlobalSCAPE CuteFTP 8 Home GlobalSCAPE CuteFTP 8 Professional GoFTP Ipswitch WS_FTP LeapWare LeapFTP LeechFTP LinasFTP MAS-Soft FTPInfo MS IE FTP Passwords NCH Software
GlobalSCAPE CuteFTP 7 Home GlobalSCAPE CuteFTP 7 Professional GlobalSCAPE CuteFTP 8 Home GlobalSCAPE CuteFTP 8 Professional GoFTP Ipswitch WS_FTP LeapWare LeapFTP LeechFTP LinasFTP MAS-Soft FTPInfo MS IE FTP
GlobalSCAPE CuteFTP 8 Professional GoFTP Ipswitch WS_FTP LeapWare LeapFTP LeechFTP LinasFTP MAS-Soft FTPInfo MS IE FTP Passwords NCH Software ClassicFTP NovaFTP Robo-FTP 3.7 SmartFTP SoftX.org FTPClient
MAS-Soft FTPInfo MS IE FTP Passwords NCH Software ClassicFTP NovaFTP Robo-FTP 3.7 SmartFTP SoftX.org FTPClient Staff-FTP TurboFTP WS_FTP WinFTP Ftp Winzip (Nico Mak Computing) Coffee Cup Free FTP PuTTY