Keyword: microsoft internet explorer
74031 Total Search   |   Showing Results : 33501 - 33520
\WinShell\WinSeven.exe %System Root%\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\taskhost.exe (Note: %System Root% is the root folder, which is usually C:\. It is also where the operating system
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run avpupdt = "%System%\1718185808\avgupdt.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run ctfmon = "{malware path and file name}
\WinShell\WinSeven.exe %System Root%\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\taskhost.exe (Note: %System Root% is the root folder, which is usually C:\. It is also where the operating system
every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run MSConfig = "%User Profile%\{random}.exe" Other System Modifications This backdoor adds the following registry
every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run iGfx DAS Standard = "%System Root%\ProgramData\wlanguard.cpl" Other System Modifications This Trojan adds the
registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run StartKey = "%System%\ylpotvd.exe" HKEY_LOCAL_MACHINE\SOFTWARE
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run wmiapsvr = "%Application Data%\wmiapsvr.exe" Other System Modifications This Trojan deletes the following files: %System Root%\r.bat (Note: %System
\w3wpdiag.exe" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\W3WPDIAG DisplayName = "Microsoft IIS Diagnostics Service" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ services\W3WPDIAG ObjectName =
system: %Application Data%\Microsoft\{6 Random Characters}.exe (Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}\Application Data on Windows
\Microsoft\ Windows\CurrentVersion\RunOnce GmailEnhancer = "%User Profile%\Application Data\AsSysCtrlSrvcIns.exe" Other System Modifications This backdoor deletes the following files: %User Profile%
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Client Server
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run NetWire = "%User
7.) Autostart Technique This backdoor adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run
Server 2012.) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run
7.) Autostart Technique This backdoor adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run
path and file name}.doc Other System Modifications This Trojan modifies the following file(s): %Application Data%\Microsoft\Office\Word12.pip (Note: %Application Data% is the current user's Application
path and file name}.dat Other System Modifications This Trojan modifies the following file(s): %Application Data%\Microsoft\Office\Word12.pip (Note: %Application Data% is the current user's Application
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run SmartIndex = "{malware path and file name}" Other System Modifications This Trojan adds the following
C:\Windows\System32.) Autostart Technique This Trojan modifies the following registry entries to ensure it automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Startup = "%User