Search
Keyword: microsoft internet explorer
) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan creates the following folders: %User Profile%\Microsoft\Dr Watson (Note:
startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Avpr = "%System%\avpr.exe" Other System Modifications This worm adds the following registry keys: HKEY_LOCAL_MACHINE\Software
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} StubPath = "%Program Files%\DBS.EXE" Other System
Profile%\Inicializar\Windows Update.exe %System Root%\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Windows Update.exe %System%\Windows Update.exe (Note: %User Profile% is the current user's
entries as part of its installation routine: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Skype = ""%Application Data%\Skype\Phone\Skype.exe" /nosplash /minimized" HKEY_CURRENT_USER
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run SysService32 = "%Windows%\systask32l.exe" Other System Modifications This worm modifies the following
following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Setup netinfo = "{random characters}" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Setup cover = "my
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Taskhost = "%User Profile%\Microsoft\lsass.exe" Dropping Routine This Trojan drops the following files:
folders: %User Profile%\Microsoft\Dr Watson (Note: %User Profile% is the current user's profile folder, which is usually C:\Windows\Profiles\{user name} on Windows 98 and ME, C:\WINNT\Profiles\{user name} on
\Windows or C:\WINNT.) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan creates the following folders: %User Profile%\Microsoft\Dr Watson (Note:
\Application Data %User Profile%\Application Data\68AD0 %User Profile%\Microsoft\Dr Watson (Note: %Program Files% is the default Program Files folder, usually C:\Program Files.. %User Profile% is the current
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This backdoor creates the following folders: %User Profile%\Microsoft\Dr Watson
) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan creates the following folders: %User Profile%\Microsoft\Dr Watson (Note:
the affected system: %User Profile%\Microsoft\dllhsts.exe (Note: %User Profile% is the current user's profile folder, which is usually C:\Windows\Profiles\{user name} on Windows 98 and ME, C:\WINNT
usually C:\Windows or C:\WINNT.) Autostart Technique This backdoor adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan creates the following folders: %User Profile%\Microsoft\Dr Watson (Note:
system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This file infector creates the following folders: %User Profile%\Microsoft