Keyword: microsoft internet explorer
74031 Total Search   |   Showing Results : 32441 - 32460
versions.. %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.) It creates the following folders: %User Profile%\Application Data\Microsoft
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan creates the following folders: %User Profile%\Application Data\Microsoft
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan creates the following folders: %User Profile%\Application Data\Microsoft
\Microsoft\Windows\DRM\v3ks.sec %AppDataLocal%\GDIPFONTCACHEV1.DAT %All Users Profile%\Microsoft\Windows\DRM\drmstore.hds %All Users Profile%\Microsoft\Network\Downloader\qmgr1.dat %All Users Profile%
SNMP Server 1009115* - Microsoft Windows SNMP Service Denial of Service Vulnerability (CVE-2018-0967) SSH Client 1008580* - OpenSSH Client Multiple Security Vulnerabilities VoIP Smart 1008941* - Asterisk
HKEY_CURRENT_USER\Keyboard Layout 2 = "{hex values}" HKEY_CURRENT_USER\Software\Microsoft\ Windows {Volume Serial Number} = "{hex values}" Download Routine This Worm connects to the following URL(s) to download its
%System Root%\XMR %System Root%\XMR\Coin %System Root%\XMR\Coin\api %AppDataLocal%\dyna %User Temp%\Microsoft (Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and
netsh firewall set opmode disable && exit cmd /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v AUOptions /t REG_DWORD /d 1 /f %System%\DllHost.exe
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run S17014297 = "{malware path and file name}" Other System Modifications This Trojan adds the following
file in the Startup folder of the Microsoft Excel application. It utilizes the auto_open macro command consequently infecting other workbooks once opened. This script also intercepts the use of two
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run S1096057 = "{malware path and file name}" Other System Modifications This Trojan adds the following registry
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run S488121 = "{malware path and file name}" Other System Modifications This Trojan adds the following registry
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run S1651823 = "{malware path and file name}" Other System Modifications This Trojan adds the following registry
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run S1484101 = "{malware path and file name}" Other System Modifications This Trojan adds the following registry
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Microsoft Updater = "{malware path and file name}" This report is generated via an automated analysis
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run WindowsUpdate = "{malware path and file name}.exe" HKEY_CURRENT_USER\Software\Microsoft\ Windows
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ DirectDraw\MostRecentApplication Name = "{malware file name}" (Note: The default value data of the said registry entry is iexplore.exe .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run S785860 = "{malware path and file name}" Other System Modifications This Trojan adds the following registry
\Software\Microsoft\ Multimedia\DrawDib HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\MediaResources\msvideo It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Multimedia
\Software\Microsoft\ Windows\CurrentVersion\MyComputer It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\MyComputer Count = "1" This report is generated via