Keyword: microsoft internet explorer
74031 Total Search   |   Showing Results : 35021 - 35040
8.0; Windows NT 5.1; Trident/4.0; .NET4.0C; .NET4.0E) It queries the value of the following registry entry: HKEY_CURRENT_USER\Microsoft\lonidi ymok="{value}"
\AppData\Roaming\Microsoft\Windows\Start Menu\Programs on Windows Vista, 7, and 8.) It adds the following processes: regsvr32 "%Program Files%\MediaInfo\MediaInfo_InfoTip.dll" /s (Note: %Program Files% is
registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run leaivadr = %Public%\Documents\{random characters}.bat
{Default} = %Program Files%\Babylon\Babylon Path = %Program Files%\Babylon HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer GlobalAssocChangedCounter = 37 HKEY_CURRENT_USER\Software
to ensure its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper
Installation This Worm drops the following files: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows\CURRENTVERSION\Run\GbpSv C:\windows\system\Plugin.exe %Program Files%\dbs.pif %Fonts%\mit.fon C:\ki.dll
Other Details This Trojan adds the following lines or registry entries as part of its routine: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows\CURRENTVERSION\RUN\Update5 {malware path and filename}
This filter blocks the ActiveX control mentioned in the January 2016 security advisory of Microsoft for which new kill bits are added. Apply associated Trend Micro DPI Rules. 1007529|
following registry entries to ensure it automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\Winlogon Shell = "explorer.exe "%Application Data%\{random
following registry entries to ensure it automatic execution at every system startup: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows NT\CurrentVersion\Winlogon Shell = "explorer.exe "%User Profile%\Application
every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Yahoo Messengger = "%System%\scvhost.exe" Other System Modifications This worm modifies the following registry keys:
its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run {random} = rundll32.exe "{malware path and file name}",Startup Other System
following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Active Setup\Installed Components\{6B808548-D083-A635-C7BB-B37E45A98DE7} StubPath = "C:\Windows\system32:ctfmonn.exe" It adds the following
following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run {random CLSID} = %Application Data%\{random1}\{random
explorer.exe Autostart Technique This spyware adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\ Windows NT\CurrentVersion\Winlogon shell = "%User Profile%\5zGBPTbA\l63WifG.exe,explorer.exe" It modifies the following registry entries: HKEY_CURRENT_USER\Software\Microsoft
Server 2008, and Windows Server 2012.) It deletes the following files: {malware path and file name}:zone.identifier It adds the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows NT
\Software\Microsoft\ Windows NT\CurrentVersion\Winlogon shell = "explorer.exe,%User Temp%\Update\Update.exe" It modifies the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ GDIPlus
HKEY_CURRENT_USER\Software\Microsoft\ Windows NT\CurrentVersion\Winlogon Shell = "%User Profile%\zUCvp4AQyB1cLe9b\oIYsIhPyAFgB.exe,explorer.exe" It modifies the following registry entries: HKEY_CURRENT_USER\Software
Autostart Technique This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Olxdkxkrdtg = "