Keyword: browser hijacker
4876 Total Search   |   Showing Results : 281 - 300
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan drops the following files: {Default browser save path}\RU001255922S4.iso
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{1B9B80A9-4477-495F-89F9-9DDA535F24E1} Other System Modifications This Trojan deletes the following files: %User Temp%
monitoring user activity whenever the user accesses certain sites in Internet Explorer . In addition, some variants may install a browser plugin component. This component monitors user browser activities in
adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{AFD4AD01-58C1-47DB-A404-FBE00A6C5486} Other System Modifications This
\Software\Description\ Microsoft\Rpc\UuidTemporaryData HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows
\Software\Description\ Microsoft\Rpc\UuidTemporaryData HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows
monitoring user activity whenever the user accesses certain sites in Internet Explorer . In addition, some variants may install a browser plugin component. This component monitors user browser activities in
monitoring user activity whenever the user accesses certain sites in Internet Explorer . In addition, some variants may install a browser plugin component. This component monitors user browser activities in
Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{890FC786-B044-4FE9-87FE-2E02B5AC9439} Other
{C8414F9F-BA90-4600-B7EA-0CEFAF5A0636} HKEY_CLASSES_ROOT\TypeLib\{C8414F92-BA90-4600-B7EA-0CEFAF5A0636} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{C8414FA0-BA90-4600-B7EA-0CEFAF5A0636
itself as a Browser Helper Object (BHO): HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{5321E378-FFAD-4999-8C62-03CA8155F0B3} Download Routine This Trojan
monitoring user activity whenever the user accesses certain sites in Internet Explorer . In addition, some variants may install a browser plugin component. This component monitors user browser activities in
monitoring user activity whenever the user accesses certain sites in Internet Explorer . In addition, some variants may install a browser plugin component. This component monitors user browser activities in
monitoring user activity whenever the user accesses certain sites in Internet Explorer . In addition, some variants may install a browser plugin component. This component monitors user browser activities in
This Trojan connects to a certain URL using the Internet browser to display an animation. It does this to hide its malicious routine. It sets a URL as the automatic configuration script address of
executed, this adware installs shortcuts and a browser homepage for some ads. According to the remote configuration, the ads start after a 288,000 second delay. This adware displays ads every time the user
}.66.169:7447 As of this writing, the said sites are inaccessible. Web Browser Home Page and Search Page Modification This backdoor modifies the Internet Explorer Zone Settings. Information Theft This backdoor
\Software\Description\ Microsoft\Rpc\UuidTemporaryData HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows
\Software\Description\ Microsoft\Rpc\UuidTemporaryData HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows
{Random GUID}\1.0 "(Default Value)" = "%COMMONPROGRAMFILES%\EZ-Plus\ez-Plus.dll" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{Random GUID} NoExplorer = "1