Keyword: ms04-032_microsoft_windows
99255 Total Search   |   Showing Results : 41 - 60
to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Robit hood = "{malware path and file name}" Other System Modifications This
Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{FF103732-4528-4322-AA8B-F7849AB7776B} Other
could execute arbitrary code in the context of the current user. Microsoft Internet Explorer Apply associated Trend Micro DPI Rules. 1006609| 1006609 - Microsoft Internet Explorer Memory Corruption
could execute arbitrary code in the context of the current user. Microsoft Internet Explorer Apply associated Trend Micro DPI Rules. 1006610| 1006610 - Microsoft Internet Explorer Memory Corruption
could execute arbitrary code in the context of the current user. Microsoft Internet Explorer Apply associated Trend Micro DPI Rules. 1006611| 1006611 - Microsoft Internet Explorer Memory Corruption
could execute arbitrary code in the context of the current user. Microsoft Internet Explorer Apply associated Trend Micro DPI Rules. 1006612| 1006612 - Microsoft Internet Explorer Memory Corruption
could execute arbitrary code in the context of the current user. Microsoft Internet Explorer Apply associated Trend Micro DPI Rules. 1006613| 1006613 - Microsoft Internet Explorer Memory Corruption
could execute arbitrary code in the context of the current user. Microsoft Internet Explorer Apply associated Trend Micro DPI Rules. 1006615| 1006615 - Microsoft Internet Explorer Memory Corruption
could execute arbitrary code in the context of the current user. Microsoft Internet Explorer Apply associated Trend Micro DPI Rules. 1006616| 1006616 - Microsoft Internet Explorer Memory Corruption
could execute arbitrary code in the context of the current user. Microsoft Internet Explorer Apply associated Trend Micro DPI Rules. 1006617| 1006617 - Microsoft Internet Explorer Memory Corruption
could execute arbitrary code in the context of the current user. Microsoft Internet Explorer Apply associated Trend Micro DPI Rules. 1006618| 1006618 - Microsoft Internet Explorer Memory Corruption
\032 Hand-Drawn 13.png %System%\SnagitPortable\App\Snagit\Stamps\Keyboard\032 R Win Black.png %System%\SnagitPortable\App\Snagit\Stamps\Windows Interface\032 Spin Control.png %System%\SnagitPortable\App
every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run mls = "%Application Data%\RAC\mls.exe -s" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run svcsc.exe
CVE-2013-1282 This security update resolves a reported vulnerability in Active Directory. The vulnerability, if left unpatched, may allow denial of service if an attacker sends a specially crafted
%Program Files% is the default Program Files folder, usually C:\Program Files.) It adds the following registry keys: HKEY_LOCAL_MACHINE\Software\HaoZip HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows
folders: %AppDataLocal%\Microsoft\Internet Explorer\Recovery\High\Active %Application Data%\Microsoft\Windows\IECompatUACache %AppDataLocal%\Microsoft\Internet Explorer\DomainSuggestions %Application Data%
%User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003, or C:\Users\{user name} on Windows Vista and 7.. %User
\AppData\Roaming\Microsoft\Windows\Start Menu on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit).. %User Profile% is the current user's profile folder, which is usually C:\Documents and
\Microsoft\ Windows\CurrentVersion\Run BANDIT STEALER = {malware file path}\{malware file name} Other System Modifications This Trojan Spy deletes the following folders: %AppDataLocal%\{Victim's IP address}
Autostart Technique This Trojan Spy adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run BANDIT