Keyword: microsoft internet explorer
74031 Total Search   |   Showing Results : 33921 - 33940
It creates the following folders: %Windows%\ServiceProfiles\NetworkService\AppData\Local\Microsoft (Note: %Windows% is the Windows folder, where it usually is C:\Windows on all Windows operating system
Settings\{User name}\Start Menu\Programs\Startup on Windows 2003(32-bit), XP and 2000(32-bit), or C:\Users\{user name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup on Windows Vista, 7, 8,
folders: %Windows%\ServiceProfiles\NetworkService\AppData\Local\Microsoft (Note: %Windows% is the Windows folder, where it usually is C:\Windows on all Windows operating system versions.) Other System
creates the following folders: %Windows%\ServiceProfiles\NetworkService\AppData\Local\Microsoft (Note: %Windows% is the Windows folder, where it usually is C:\Windows on all Windows operating system
Windows folder, where it usually is C:\Windows on all Windows operating system versions.) It creates the following folders: %Windows%\ServiceProfiles\NetworkService\AppData\Local\Microsoft (Note: %Windows%
\Documents and Settings\{User name}\Start Menu\Programs\Startup on Windows 2003(32-bit), XP and 2000(32-bit), or C:\Users\{user name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup on Windows
following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 Owner = "L
).) Other System Modifications This Potentially Unwanted Application adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ RestartManager\Session0000 It adds the following registry
following file(s): %Application Data%\Microsoft\Office\Word12.pip (Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application
This Trojan modifies the following file(s): %Application Data%\Microsoft\Office\Word12.pip (Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and
usually is C:\ on all Windows operating system versions.) It creates the following folders: %Windows%\ServiceProfiles\NetworkService\AppData\Local\Microsoft (Note: %Windows% is the Windows folder, where it
Windows folder, where it usually is C:\Windows on all Windows operating system versions.) It creates the following folders: %Windows%\ServiceProfiles\NetworkService\AppData\Local\Microsoft (Note: %Windows%
startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{28ABC5C0-4FCB-11CF-AAX5-81CX1C635612} StubPath = %System Root%\RECYCLER\S-1-5-21-1482476501-1644491937-682003330-1013
This worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{random} StubPath = "
\Startup on Windows 2003(32-bit), XP and 2000(32-bit), or C:\Users\{user name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit), 10(64-bit
(es): svchost.exe Autostart Technique This Trojan modifies the following registry entry(ies) to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows NT
list hkey_current_user\software\local appwizard-generated applications\ {malware file name}\settings HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\Security Center\Svc HKEY_CURRENT_USER\Software\bisoft
list hkey_current_user\software\local appwizard-generated applications\ {malware file name}\settings HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\Security Center\Svc HKEY_CURRENT_USER\Software\bisoft
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run onestep = "%Program Files%\onestep\onestepe.exe" Other System Modifications This Trojan deletes the
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run CEuqMGkJOiYJQO =