Keyword: microsoft internet explorer
74031 Total Search   |   Showing Results : 34201 - 34220
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\Winlogon Shell = "explorer.exe %System%" (Note: The default value data of the said registry entry is
registry entries to ensure it automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\Winlogon Shell = Explorer.exe rundll32.exe thxr.wgo nwfdtx (Note:
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows NT\CurrentVersion\Winlogon Shell = explorer.com Download Routine This Trojan connects to the following website(s) to download
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows NT\CurrentVersion\Winlogon Shell = explorer.com Download Routine This Trojan connects to the following website(s) to download
automatic execution of dropped component at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Epodusexuy = "rundll32.exe "%Windows%\{random file name}.dll",Startup" Other
system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run {random} = "rundll32.exe "%Windows%\seasqdh.dll",Startup" Other System Modifications This Trojan adds the following registry
) Autostart Technique This spyware adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion
system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Microsoft DLL Registration = "%User Profile%\Application Data\regsrv32.exe"
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run DlStart = "
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run {malware file name} = "{malware path and file name}" Other System Modifications This Trojan adds the
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ DirectDraw\MostRecentApplication Name = "{malware file name}" (Note: The default value data of the said registry entry is iexplore.exe .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
\Software\Microsoft\ Direct3D\MostRecentApplication It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Direct3D\MostRecentApplication Name = "{malware file name}" Dropping Routine
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Microsoft Updater = "{malware path and file name}" Other System Modifications This Trojan adds the following
\Software\Microsoft\ Windows\CurrentVersion\Policies\ Associations It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Associations ModRiskFileTypes
\Software\Microsoft\ Windows Script\Settings It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows Script\Settings JITDebug = "0" Dropping Routine This backdoor drops the
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{random} It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{random} StubPath = "
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ DirectDraw\MostRecentApplication Name = "{malware file name}" (Note: The default value data of the said registry entry is iexplore.exe .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Shell22 = "{malware path and file name}" Other System Modifications This spyware adds the following registry
Files%\Common Files\Microsoft Shared\MSINFO\rejoice2009.exe (Note: %Program Files% is the default Program Files folder, usually C:\Program Files.) Dropping Routine This Trojan drops the following files:
Files%\Common Files\Microsoft Shared\MSINFO\rejoice2009.exe (Note: %Program Files% is the default Program Files folder, usually C:\Program Files.) Dropping Routine This Trojan drops the following files: