Keyword: microsoft internet explorer
74031 Total Search   |   Showing Results : 33741 - 33760
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ DirectDraw\MostRecentApplication Name = "{malware file name}" (Note: The default value data of the said registry entry is iexplore.exe .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ DirectDraw\MostRecentApplication Name = "{malware file name}" (Note: The default value data of the said registry entry is iexplore.exe .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run {random name} = "{Malware Path and File Name}" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{23F49DC2-B21E-46a2-9131-58AF13896C44} It also creates the following registry entry(ies) as part of its installation routine: HKEY_LOCAL_MACHINE
\Microsoft\ Windows\CurrentVersion\Run csrcs = %User Temp%\csrcs.exe Other System Modifications This Trojan adds the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\MCD
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System DisableTaskMgr = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies\ system DisableTaskMgr = 1
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Sol It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Sol SolID = "82248D33-B81D-4050-BA4C-E09719D6FAA0
following registry keys: HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Cryptography It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Cryptography MachineGuid =
keys: HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Cryptography It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Cryptography MachineGuid = "10174da5-96d2-4956-8348-73b8a82630ef
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run interneter = "%System%\interneter.exe" Other System Modifications This Trojan modifies the following
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run {malware filename} = "rundll32.exe "{malware pathname}",mpegInOpenTSStream" Other System Modifications This
Other System Modifications This Trojan adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ MSDAIPP\Provider\{444A2F01-B774EAE8-A55B4693-8C6502C4} HKEY_CURRENT_USER\Software\Microsoft
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Shell22 = "{malware path and file name}" Other System Modifications This Trojan adds the following registry
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run PC_Clean_Optimizer = "{malware path and file name}" Other System Modifications This adware adds the
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run ASK = "\ASkyline.exe" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run TOOLS =
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ DirectDraw\MostRecentApplication Name = "{malware file name}" (Note: The default value data of the said registry entry is iexplore.exe .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Update = "{malware path and file name}" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run
\Software\Microsoft\ Windows Script\Settings It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows Script\Settings JITDebug = "0" Dropping Routine This Trojan drops the
Root%\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\drvhandler.exe %Program Data%\Microsoft\Windows\Start Menu\Programs\Startup\drvhandler.exe (Note: %System Root% is the Windows root
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run regedit32 = "{malware path and file name}" Other System Modifications This spyware adds the following