Keyword: browser hijacker
4876 Total Search   |   Showing Results : 381 - 400
\ Windows\CurrentVersion\Explorer\ Browser Helper Objects NoExplorer = "1" It deletes the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
\Software\Description\ Microsoft\Rpc\UuidTemporaryData HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Windows
executes the following commands from a remote malicious user: Capture screen shots Download files Upload files Enumerate files and folders Execute files Get default internet browser Navigate and open a URL
backdoor does not have any propagation routine. Backdoor Routine This backdoor executes the following commands from a remote malicious user: Perform arbitrary remote shell commands (Prints output to browser
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\ Other System Modifications This Trojan adds the following registry keys: HKEY_CLASSES_ROOT\BarNews.ClsBarNews\Clsid
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\ Other System Modifications This spyware adds the following registry keys: HKEY_CLASSES_ROOT\BarNews.ClsBarNews\Clsid
\CurrentVersion\Explorer\ Browser Helper Objects\ERROR Other System Modifications This spyware adds the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Policies\ Ext\CLSID It
specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who
\ Wow6432Node\CLSID\{EFFA133B-2DD3-B359-AC09-3BCF0EF98816}\ Implemented Categories\{{GUID}} (Default) = "" HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ Microsoft\Windows\CurrentVersion\ explorer\Browser Helper
Users may encounter this malicious app through a link in spammed messages. Once users visit http://{BLOCKED}-update-client.my-vip-life.ru , they will receive a message urging them to download a browser
NOTES: This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. The script checks for the affected system's Web Browser and its
Cross site scripting may occur when a web application does not properly validate or escape user input. If user input is echoed back to the browser without escaping it properly or used without proper
\Browser Helper Objects\{8327886C-C208-408B-AD90-B3EE40C42947}\ {BLOCKED} {BLOCKED} --> Other Details This Trojan adds the following lines or registry entries as part of its routine:
\Browser Helper Objects\{F02B00B3-A88C-4EF1-98FE-557F1DAF6E4D}\ {BLOCKED} {BLOCKED} --> Other Details This Trojan adds the following lines or registry entries as part of its routine:
\Explorer\ Browser Helper Objects\{00000000-0000-0000-0000-000000000000}
Details This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Web Browser Home Page and Search Page Modification This
CVE-2010-3175 Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.11 and Thunderbird 3.1.x before 3.1.5 allow remote attackers to cause a denial of service
CVE-2010-0166 The gfxTextRun::SanitizeGlyphRuns function in gfx/thebes/src/gfxFont.cpp in the browser engine in Mozilla Firefox 3.6 before 3.6.2 on Mac OS X, when the Core Text API is used, does not
possibly malicious URL in a web browser: https://c{BLOCKED}s.com/ipfs/bafkreiddros3nljwt5yor2q4bbelatvkn3aeygsjicq2heap63hdvffszu#n-k{BLOCKED}.jp It redirects the web browser to the following URL: