Search
Keyword: microsoft internet explorer
HKEY_CURRENT_USER\Software\Microsoft\ Bind It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Bind comment = "3913207" HKEY_CURRENT_USER\Software\Microsoft\ Bind comment2 = "f" Dropping
HKEY_CURRENT_USER\Software\Microsoft\ Bind It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Bind comment = "3913044" HKEY_CURRENT_USER\Software\Microsoft\ Bind comment2 = "f" Dropping
at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run KB00892240.exe = "%User Profile%\Application Data\KB00892240.exe" Other System Modifications This worm adds the
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run SoundMan = "BarClientServer.exe" Other System Modifications This Trojan adds the following registry
7.) Autostart Technique This worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\ Bind It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Bind comment = "install_player_3912948.exe" HKEY_CURRENT_USER\Software\Microsoft\ Bind comment2
\ControlSet001\ Services\Nwsapagent\Parameters It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion ServiceArg = "{random values}" HKEY_LOCAL_MACHINE\SOFTWARE
startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{254F4E25-A65F-2764-0003-070806050704} StubPath = "%User Temp%\wjcxblcx.exe" Other System Modifications This Trojan adds the
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This spyware creates the following folders: %User Profile%\Microsoft\Dr Watson
name} on Windows Vista and 7.) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan creates the following folders: %User Profile%\Microsoft\Dr Watson (Note:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Setup netinfo = "{random characters}" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Setup cover = "123" HKEY_LOCAL_MACHINE\SYSTEM
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan creates the following folders: %User Profile%\Microsoft\Dr Watson (Note:
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run 1784817181 = "%User Profile%\1784817181.exe" Other System Modifications This
\Software\Description\ Microsoft\Rpc\UuidTemporaryData HKEY_LOCAL_MACHINE\SOFTWARE\vPro4\ 51211 It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Description\ Microsoft\Rpc\UuidTemporaryData
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run 901628814 = "%User Profile%\901628814.exe" Other System Modifications This
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run 317709993 = "%User Profile%\317709993.exe" Other System Modifications This
the affected system: %User Profile%\Microsoft\torrent.exe (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run avpupdt = "%System%\1718185808\avgupdt.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run ctfmon = "{malware path and file name}
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan creates the following folders: %User Profile%\Microsoft\Dr Watson (Note: