Keyword: browser hijacker
4876 Total Search   |   Showing Results : 461 - 480
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\ Other System Modifications This Trojan adds the following registry keys: HKEY_CLASSES_ROOT\SetupWin10x.ClsSetupWin10x
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\ Other System Modifications This Trojan adds the following registry keys: HKEY_CLASSES_ROOT\SetupWin10x.ClsSetupWin10x
adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\ Other System Modifications This Trojan adds the following registry keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\ Other System Modifications This Trojan adds the following registry keys: HKEY_CLASSES_ROOT\SetupWin10x.ClsSetupWin10x
FastStone Browser Flock Internet Explorer K-Meleon Mozilla Firefox Opera Browser Stolen Information This spyware sends the gathered information via HTTP POST to the following URL: http://{BLOCKED
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
}to.no-ip.biz:6651 It displays the following images: NOTES: This spyware monitors browser activities of the affected system, specifically the address bar or title bar, for the text bb.com.br . When it finds the said
the following processes: wmic cpu get name wmic path win32_VideoController get name wmic os get caption Information Theft This Trojan Spy gathers the following data: Browser data (e.g., autofill,
\ Browser Helper Objects\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{A3BC75A2-1F87-4686-AA43-5347D756017C}
registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{B05CB5FE-1E22-43C7-93E2-4CF04C87B3CC} Other System Modifications This Trojan adds the following
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\ Windows\CURRENTVERSION\Explorer\ Browser Helper Objects\ {1B12F639-CBA9-45DD-89FE-9FA7D4340716} (default) = Other System Modifications This Trojan adds the following registry
This spyware hooks an API to evade detection. It gathers the browser cookies of the affected system. As a result, user credentials used may be stolen by the remote attacker. It also has certain
Trojan drops the following files: %User Temp%\{8 random characters}.ps1 -> 4 different files, %User Temp%\{6 random characters}.zip -> TOR Browser files %User Temp%\{Computer Name}.log -> contains logs of
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
Computer Name / Username OS Version Browser Informations Other Details Based on analysis of the codes, it has the following capabilities: Install Browser plugins (it may do this monitor browser activites,
every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
recipient. When the reader clicks on the link, the browser opens a page that hosts a malicious JavaScript. The script then redirects to a blackhole exploit kit server, where a .JAR file is executed. The said
by users when visiting malicious sites. Other Details This Trojan Spy does the following: Perform SQL queries to target databases. Gather credentials from browsers (IE, FireFox and Chrome). Get browser
This Trojan drops the following files: {malware path}\{malware file name}.bat Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Other Details