Search
Keyword: microsoft internet explorer
every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Microsoft Agent = "%System%\SVCH0ST.exe" Dropping Routine This worm drops the following files: %System%\SVCH0ST.EXE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UACDisableNotify = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies\ system EnableLUA = "0" This report is generated via an automated
registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ DirectDraw\MostRecentApplication Name = "{malware file name}" (Note: The default value data of the said registry entry is iexplore.exe .)
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run ASK = "\ASkyline.exe" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run TOOLS =
\SOFTWARE\Microsoft\ Cryptography It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Cryptography MachineGuid = "15823514-104f-430a-9ca3-f2fdd1998032" Other Details This Trojan
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ DirectDraw\MostRecentApplication Name = "iexplore.exe" (Note: The default value data of the said registry entry is iexplore.exe .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run {malware file name} = "{malware path and file name}" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Opera = "{malware path and file name}" Other System Modifications This Trojan adds the following registry
This Backdoor adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows Script\Settings It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows Script
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Update = "{malware path and file name}" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run
adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System It creates the following registry entry(ies) to disable Task Manager, Registry Tools and
adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System It creates the following registry entry(ies) to disable Task Manager, Registry Tools and
every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run {malware file name} = "%User Temp%\system.scr" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run ISAMHNCUW = "{Malware path and file name}.exe" - if affected machine has Admin rights HKEY_CURRENT_USER
CVE-2010-2563 This security update addresses a vulnerability in Microsoft Windows that could allow remote code execution if a user opened a specially crafted file using WordPad. Windows Server 2003
CVE-2010-2746,MS10-081,ms10-081 Heap-based buffer overflow in Comctl32.dll (aka the common control library) in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2,
CVE-2009-3130 Heap-based buffer overflow in Microsoft Office Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code
CVE-2009-1546,MS09-038 Integer overflow in Avifil32.dll in the Windows Media file handling functionality in Microsoft Windows allows remote attackers to execute arbitrary code on a Windows 2000 SP4
CVE-2010-1253,MS10-038 Microsoft Office Excel 2002 SP3, 2007 SP1, and SP2; Office 2004 for mac; Office 2008 for Mac; Open XML File Format Converter for Mac; and Office Compatibility Pack for Word,
CVE-2009-2498,MS09-047 Microsoft Windows Media Format Runtime 9.0, 9.5, and 11 and Windows Media Services 9.1 and 2008 do not properly parse malformed headers in Advanced Systems Format (ASF) files,