Keyword: microsoft internet explorer
74031 Total Search   |   Showing Results : 34641 - 34660
located.) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed
%Application Data%\Microsoft\svchost.exe (Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{kivnpxf8-upa0-bk6z-bhom-6jl92o4dvdv1} stubpath = [REG_EXPAND_SZ, value: ] It registers as a system
every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run NLEZ.EXE = "%System Root%\System Volume Information\BICZIPA.EXE" Other System Modifications This worm adds the
Autostart Technique This worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\
{user name} on Windows Vista and 7.) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft
at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{91BPF6G1-4ELN-6M2E-BBZ9-4020406080a0} StubPath = "%System Root%\MSN\D\Mic.exe" Other System
located.) Autostart Technique This worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components
automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{14MAD6M8-1MAD-81AD-JIM6-26OP5G3369085} StubPath = "%System Root%\xAVx\ReleAsE\xAVy.exe
system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Remote Shell Manager = "%User Profile%\RECYCLER\logon.exe" Other System Modifications This worm deletes the following files:
located.) Autostart Technique This worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion
%User Profile%\Microsoft\CryptnetUrlCache %User Profile%\CryptnetUrlCache\Content (Note: %User Profile% is the current user's profile folder, which is usually C:\Windows\Profiles\{user name} on Windows 98
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run System32 = "%System%\winds32.exe" Other System Modifications This Trojan deletes the following files: %System%\winds32.exe %System%\dflgh8jkd2q8.exe
system is located.) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup
located.) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed
system is located.) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT
located.) Autostart Technique This worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components
execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Remote Start Manager = "%User Profile%\RECYCLER\login.exe" Other System Modifications This Trojan deletes
name}\settings HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\Security Center\Svc HKEY_CURRENT_USER\Software\bisoft It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
system is located.) Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup