Keyword: microsoft internet explorer
74031 Total Search   |   Showing Results : 32341 - 32360
Windows Vista and 7.) Autostart Technique This backdoor adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This backdoor drops and executes the following files: %Application Data%\Microsoft
system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run ieupdate = "%System%\ieupdates.exe" Other System Modifications This Trojan adds the following registry entries:
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run MSConfig = "%User Profile%\jwtdkdrw.exe" Other System Modifications This
Itanium-based Systems Service Pack 2 Trend Micro clients using OfficeScan with Intrusion Defense Firewall (IDF) may refer to the table below for the pattern filter identifier(s): Microsoft Bulletin ID
CVE-2014-1817,CVE-2014-1818 This security update addresses vulnerabilities found in Microsoft Windows, Microsoft Office, and Microsoft Lyn. Once successfully exploited via a specially crafted
\WinShell\WinSeven.exe %System Root%\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\taskhost.exe (Note: %System Root% is the root folder, which is usually C:\. It is also where the operating system
\Local\Temp on Windows Vista and 7.) Other System Modifications This worm adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ sOtFOxtu It adds the following registry entries:
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\RunOnce Microsoft = "%Application Data%\svchost.exe" Other System Modifications This backdoor deletes the following files: %Application Data%\svchost.exe
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run msbridge = "%Temp%\msbridge.exe" Other System Modifications This Trojan modifies the following file(s):
%System Root% is the root folder, which is usually C:\. It is also where the operating system is located.) It adds the following registry keys: HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\ MS SETUP (ACME) It
\WinShell\WinSeven.exe %System Root%\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\taskhost.exe (Note: %System Root% is the root folder, which is usually C:\. It is also where the operating system
\software\microsoft\ esent\process\{malware file name} hkey_local_machine\software\microsoft\ esent\process\{malware file name}\ debug It modifies the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM
entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run avpupdt = "%System%\1718185808\avgupdt.exe" HKEY_LOCAL_MACHINE\SOFTWARE
Data%\Microsoft\Office\Word12.pip (Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000(32-bit),
Data%\Microsoft\Office\Word12.pip (Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000(32-bit),
\Microsoft\Office\Word12.pip (Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000(32-bit), XP, and
\Microsoft\Office\Word12.pip (Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000(32-bit), XP, and
\Microsoft\Office\Word12.pip (Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000(32-bit), XP, and
\Microsoft\Office\Word12.pip (Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000(32-bit), XP, and