Keyword: microsoft internet explorer
74031 Total Search   |   Showing Results : 34581 - 34600
execution at every system startup: HKLM\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run netmgr = %Windows%\msapps\netmgr.exe Other System Modifications This Trojan adds the following registry entries: HKLM
Trojan adds the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\ Services\Company MicroSoft Description = "Company MicroSoft 2014 - 2" Other Details This Trojan connects to the
automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run wajev6615a = "{random characters}" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion
adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run wszv61jt6a = "{random characters}
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run Messenger = "%User Temp%\avgt32.exe" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Messenger = "%User Temp%\avgt32.exe" This report is
\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\Windows LoadAppInit_DLLs = "1" It modifies the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\Windows AppInit_DLLs
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run GoogleTalkPlugin = "%User Temp%\GoogleTalkPlugin.exe" HKEY_CURRENT_USER\Software\Microsoft\ Windows
{user name} on Windows Vista and 7.) Autostart Technique This spyware adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft
\SOFTWARE\Microsoft\ Windows\CurrentVersion\policies\ system EnableLUA = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Security Center UacDisableNotify = "1" Dropping Routine This spyware drops the following
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Microsoft Update 2.1 = "{malware path and file name} " Dropping Routine This Trojan drops the following
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Microsoft Windows = "%Windows%\Photos.exe" Dropping Routine This Trojan drops the following files: %Windows%\microsoft.dll (Note: %Windows% is the
users when visiting malicious sites. Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\Microsoft Windows Upgrade Client ImagePath = "%System%\lsas.exe" It registers as a system service to ensure its automatic
execution at every system startup: HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run IOFVMI DMSLIW = "{Malware Path}\{Malware Filename}.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
\Microsoft\ DirectDraw\MostRecentApplication Name = "iexplore.exe" (Note: The default value data of the said registry entry is iexplore.exe .) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ DirectDraw
\Wilbert %User Profile%\Microsoft\Interface %User Profile%\Interface\HD11E512-EF13-76B7-14FH8FED %User Profile%\Microsoft\WLanData (Note: %System Root% is the Windows root folder, where it usually is C:\ on
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run taskmgr = "%Windows%\taskmgr.exe -kira" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run IEXPLORE = "%System%\config\IEXPLORE.EXE
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run CharItY = "%User Startup%\Purchases.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run 2 = "%User Profile%\winmgr13.exe" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run {malware file name} = "{malware path and file name}" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows