![]() Image : ' C:\Program Files (x86)\Microsoft Office\root\integration\integrator.exe' Registry_event_removal_com_hijacking_registry_key.yml Registry_event_office_vsto_persistence.yml Registry_event_asep_reg_keys_modification_wow6432node.yml ' C:\Program Files\Microsoft Office\root\integration\integrator.exe' Registry_event_asep_reg_keys_modification_currentversion_nt.yml Registry_event_asep_reg_keys_modification_currentversion.yml ' C:\Program Files (x86)\Microsoft Office\root\integration\integrator.exe' Registry_event_asep_reg_keys_modification_common.yml While Integrator.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes. The following table contains possible examples of Integrator.exe being misused. Legal Copyright: Copyright (c) 2003-2020 Glarysoft LtdĬ:\Program Files (x86)\Glary Utilities 5\Integrator.exe.Subject: CN=Glarysoft LTD, O=Glarysoft LTD, S=Beijing, C=CN.Issuer: CN=DigiCert Assured ID Code Signing CA-1, OU=O=DigiCert Inc, C=US.(RW-) C:\Program Files (x86)\Glary Utilities 5
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |