Keyword: microsoft internet explorer
74031 Total Search   |   Showing Results : 34781 - 34800
usually C:\. It is also where the operating system is located.) It adds the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Active Setup\Installed Components\
Autostart Technique This worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\
execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{B7489BEF-CFA9-402d-9C8D-09E2160B2644} stubpath = [REG_EXPAND_SZ, value: ] It registers as a system
Vista and 7.) Autostart Technique This backdoor adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Startup Services
2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.) It adds the following registry keys: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\RunOnce It
at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{0K1DM7IA-210A-36OP-QQS9-431296375110} StubPath = "%System Root%\BCC\i\Lsp.exe" Other System
service to ensure its automatic execution at every system startup by adding the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Comhidserv70 ImagePath = "%System%\svchost.exe -k netsvcs
located.) Autostart Technique This worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components
Profile%\Microsoft\Telexe Copy.exe (Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:\Users\{user
located.) Autostart Technique This worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion
located.) Autostart Technique This worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion
enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{67KLN5J0-4OPM-61WE-KKX3-457QWE23218} StubPath = "%System Root%\ACC2\F2C2
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Shadow.jpg2 = "\Shadow.jpg" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{9B71D88C-C598-4935-C5D1-43AA4DB90836} stubpath =
enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{67MAD6M8-1MAD-81AD-MAD6-32OP5G1234521} StubPath = "%System Root%\Feast\Ival
enable its automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run winlogin = "%User Profile%\Windows\winlogin.exe" HKEY_CURRENT_USER\Software
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run 1fafabd = "%System Root%\1fafabde\1fafabde.exe" HKEY_CURRENT_USER\Software
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run 9bac35 = "%System Root%\9bac35e\9bac35e.exe" HKEY_CURRENT_USER\Software
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run d1a6f39 = "%System Root%\d1a6f398\d1a6f398.exe" HKEY_CURRENT_USER\Software
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run cb8d2bc = "%System Root%\cb8d2bc3\cb8d2bc3.exe" HKEY_CURRENT_USER\Software