Keyword: browser hijacker
4876 Total Search   |   Showing Results : 321 - 340
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{CC01FC6C-2E41-D45D-D48E-1AB8A86D1481}
Browser Helper Object (BHO): HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{B7ED763A-6983-471B-8A2B-A3FDA32DA4E7} Other System Modifications This Trojan adds
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{CC01FC6C-2E41-D45D-D48E-1AB8A86D1481}
Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.) NOTES: The {variable URI} depends on the browser plugin in
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{CC01FC6C-8587-3284-DE81-78E8531A12E7}
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{462D8011-7EEA-46F1-94E7-E81C6A1243A4}
bookmarks, setting browser homepage, and getting shortcuts on the device. This backdoor may be manually installed by a user. It does not have any propagation routine. It does not drop any other file. It does
This malicious browser extension is disguised as a Facebook Valentines Theme that affects browsers, one of which is the Google Chrome browser. To get a one-glance comprehensive view of the behavior
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\ Other System Modifications This Trojan adds the following registry keys: HKEY_CLASSES_ROOT\CanvNews.ClsCanvNews\Clsid
Office Product Key Yahoo Messenger saved IDs and Passwords Mozilla Firefox saved Credentials Google Chrome saved Credentials Opera Browser saved Credentials WindowsLive Credentials PalTalk Credentials
execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\
BraveSoftware CentBrowser Chedot CocCoc Elements Browser Epic Privacy Browser Kometa Orbitum Sputnik uCozMedia Vivaldi CatalinaGroup Liebao Sleipnir5 QIP Surf Coowon SeaMonkey Flock UCBrowser BlackHawk Cyberfox
the following information: IP address MAC address Username Computer name Country name Windows key Browsers Running processes Default browser OS information (version, name, architecture) Storage
\CURRENTVERSION\Explorer\Browser Helper Objects\{F02B00B3-A88C-4EF1-98FE-557F1DAF6E4D} NoExplorer=1 HKEY_LOCAL_MACHINE\SOFTWARE\DESCRIPTION\MICROSOFT\Rpc\UuidTemporaryData NetworkAddress= HKEY_LOCAL_MACHINE
attachment to email messages spammed by other malware/grayware or malicious users. Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Download Routine
detection for the ChatZum browser extension. It has the capability of changing the home page and search engine. It needs other components to perform its intended routine. It is typically installed in
exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this
2010-2745 Microsoft Windows Media Player (WMP) 9 through 12 does not properly deallocate objects during a browser reload action, which allows user-assisted remote attackers to execute arbitrary code
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: Installation This Trojan drops the following files: {Default browser save path}