Keyword: browser hijacker
4876 Total Search   |   Showing Results : 301 - 320
a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights
registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{EEAD004E-7E2D-49f8-831C-A01647E85B53} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
Routine This Trojan connects to the following URL(s) to download its component file(s): http://{BLOCKED}tropoulos.gr/images/houses/large/dire_expless_ 256.jpg NOTES: It opens an instance of the browser
It is capable of creating a file that can steal the any of following information: OS version IP address Computer name Antivirus product installed Browser information, username and passwords Country
specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's
the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Moodle 3.1.2 and prior
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan drops the following files: {Default browser save path}
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan drops the following files: {Default browser save path}
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan drops the following files: {Default browser save path}\TXRTN_7893085.zip
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan drops the following files: {Default browser save path}\{GUID}.zip
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan drops the following files: {Default browser save path}\{GUID}.zip
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{efe41db1-231e-4fac-8b0d-4e03f37a8dbf}
execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It registers itself as a Browser Helper Object (BHO) to ensure its automatic
BHO to ensure its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper
Clipboard data Captured screenshots Information from the following application: 360 Browser 3DFTP AbsoluteTelnet ALFTP Avant Baidu Barca BitKinex BlackHawk Browzar Canary Chrome Chromium Citrio Comodo Dragon
Clipboard data Captured screenshots Information from the following application: 360 Browser 3DFTP AbsoluteTelnet ALFTP Avant Baidu Barca BitKinex BlackHawk Browzar Canary Chrome Chromium Citrio Comodo Dragon
Routine This Trojan takes advantage of the following software vulnerabilities to download possibly malicious files: CVE-2013-3897 NOTES: It checks if browser is Internet Explorer. It targets Windows NT 5.1
emerging unknown security risks. It does this through digital DNA fingerprinting, API mapping, and other file features analysis. Browser modifiers change your browser's settings to redirect you to other
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Trojan drops the following files: {Default browser save path}\TXRTN_4771691.zip