Keyword: microsoft internet explorer
74031 Total Search   |   Showing Results : 32141 - 32160
CVE-2009-2494,MS09-037 The Active Template Library (ATL) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers
CVE-2011-1508,CVE-2011-3410,CVE-2011-3411,CVE-2011-3412 This security update resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Office . The most
startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run explorer.exe = "%User Temp%\explorer.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run explorer.exe = "%User
Users Profile%\Microsoft\Windows\Start Menu\Programs\7-Zip %System Root%\Users %System Root%\Program Files\7-Zip (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents
C:\Windows\Start Menu or C:\Documents and Settings\{User name}\Start Menu on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming\Microsoft\Windows\Start Menu on Windows Vista and
\Microsoft\Windows\Start Menu on Windows Vista and 7.) Other System Modifications This Trojan deletes the following files: %User Profile%\update\window1.tmp %User Profile%\update\bibibei_feifan.exe %User
Windows operating system versions.) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft
and Settings\{user name}\Start Menu on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming\Microsoft\Windows\Start Menu on Windows Vista (32- and
the following copies of itself into the affected system: %Application Data%\{Malware Filename}.exe %System%\{Malware Filename}.exe %ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup\{malware
\Command Digital %Start Menu%\Programs\Command Digital\AutoHook 2010 %User Profile%\Microsoft\HTML Help (Note: %System Root% is the root folder, which is usually C:\. It is also where the operating system is
\xshqvjciyc %Windows%\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Caches %All Users Profile%\Microsoft\Windows\Caches %Windows%\ServiceProfiles\NetworkService\AppData\Local\Microsoft (Note:
automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run KB{random number} = "%User Profile%\Application Data\KB{random number}.exe" Other System
automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run KB{random number} = "%User Profile%\Application Data\KB{random number}.exe" Other System
automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run KB{random number} = "%User Profile%\Application Data\KB{random number}.exe" Other System
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Microsoft Update
\Application Data on Windows 2000, XP, and Server 2003.) It adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\RunOnce It modifies the following registry entries:
\Application Data on Windows 2000, XP, and Server 2003.) It adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\RunOnce It modifies the following registry entries:
at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run UIdcom = "%User Profile%\UIdcom.exe" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run UIdcom =
\Application Data on Windows 2000, XP, and Server 2003.) It adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\RunOnce It modifies the following registry entries:
\Application Data on Windows 2000, XP, and Server 2003.) It adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\RunOnce It modifies the following registry entries: