Keyword: microsoft internet explorer
74031 Total Search   |   Showing Results : 33361 - 33380
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run {malware file name} = "%System Root%\{malware file name}.exe" Other System Modifications This spyware adds
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run {malware file name} = "%System Root%\{malware file name}.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\RunOnce {malware file name} = "{malware path and file name}" Other System Modifications This Trojan adds the
adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System It creates the following registry entry(ies) to disable Task Manager, Registry Tools and
\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies\ system EnableLUA = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UacDisableNotify = "1" Other Details This Trojan connects to the following
\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies\ system EnableLUA = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UacDisableNotify = "1" Other Details This Trojan connects to the following
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run svhost.exe = "%User Profile%\Application Data\svhost.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
\Software\Microsoft\ Windows Script\Settings It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows Script\Settings JITDebug = "0" Dropping Routine This Trojan drops the
\SOFTWARE\Microsoft\ Security Center UACDisableNotify = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies\ system EnableLUA = "0" This report is generated via an automated analysis
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Shell = "{malware path and file name}" Other System Modifications This Trojan adds the following registry
every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Iejfiekjjjfwef.exe = "%User Profile%\Application Data\Iejfiekjjjfwef.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ DirectDraw\MostRecentApplication Name = "{malware file name}" (Note: The default value data of the said registry entry is iexplore.exe .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run S4112636 = "{malware path and file name}" Other System Modifications This Trojan adds the following registry
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run S160190187 = "{malware path and file name}" Other System Modifications This Trojan adds the following
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Shell = "{malware path and file name}" Other System Modifications This Trojan adds the following registry
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run WINXP = "{malware path}\{malware filename}" Other System Modifications This spyware adds the following
a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This is the Trend Micro detection for infected Microsoft Excel files which contain
adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\
\Software\Microsoft\ SysInternal It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ SysInternal (Default) = {random values} Download Routine This Trojan connects to the following
following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ RFC1156Agent\CurrentVersion\Parameters It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ RFC1156Agent