Search
Keyword: microsoft internet explorer
keys: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\AboutURLs HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced\Folder\Hidden\ SHOWALL HKEY_CURRENT_USER\Software
\ Advanced\Folder\HideFileExt It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main Default_Page_URL = "http://www.{BLOCKED}6.info" HKEY_CURRENT_USER\Software
\ Advanced\Folder\HideFileExt It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main Default_Page_URL = "http://www.{BLOCKED}6.info" HKEY_CURRENT_USER\Software
keys: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\AboutURLs HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced\Folder\Hidden\ SHOWALL HKEY_CURRENT_USER\Software
keys: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\AboutURLs HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced\Folder\Hidden\ SHOWALL HKEY_CURRENT_USER\Software
\ Advanced\Folder\HideFileExt It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main Default_Page_URL = "http://www.{BLOCKED}6.info" HKEY_CURRENT_USER\Software
\ Advanced\Folder\HideFileExt It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main Default_Page_URL = "http://www.{BLOCKED}6.info" HKEY_CURRENT_USER\Software
\ Advanced\Folder\HideFileExt It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main Default_Page_URL = "http://www.{BLOCKED}6.info" HKEY_CURRENT_USER\Software
\ Advanced\Folder\HideFileExt It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main Default_Page_URL = "http://www.{BLOCKED}6.info" HKEY_CURRENT_USER\Software
Explorer\International\CpMRU It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\International\CpMRU Enable = 1 HKEY_CURRENT_USER\Software\Microsoft\ Internet
\Software\Microsoft\ Internet Explorer\SearchScopes It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\SearchScopes DownloadUpdates = "23c" HKEY_CURRENT_USER
Windows 2000, XP, and Server 2003.) It adds the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\ Microsoft\Internet Explorer\Control Panel HKEY_CURRENT_USER\SOFTWARE\Policies\ Microsoft
CVE-2010-3962 Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token
/prefetch:2 Other System Modifications This Joke Program modifies the following file(s): %AppDataLocal%\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{49371D05-4C62-11EA-88B7-005056BC5B9B}.dat
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
Explorer\New Windows\Allow It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\New Windows\Allow *.wanqq.net = "{random values}" HKEY_CURRENT_USER\Software
/prefetch:2 It creates the following folders: %Application Data%\Microsoft\Windows\IECompatUACache %Application Data%\Microsoft\Windows\IECompatCache %AppDataLocal%\Microsoft\Internet Explorer\DomainSuggestions
\Software\Microsoft\ Internet Explorer\Main\FeatureControl HKEY_CURRENT_USER\Software\Microsoft\ Internet Explorer\Main\FeatureControl\ FEATURE_BLOCK_INPUT_PROMPTS It adds the following registry entries:
Microsoft addresses the following vulnerabilities in its November batch of patches: (MS12-071) Cumulative Security Update for Internet Explorer (2761451) Risk Rating: Critical This patch addresses