Keyword: browser hijacker
4876 Total Search   |   Showing Results : 541 - 560
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{39fc2065-c9c7-49cd-8942-44cc2dedc844}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{A9DAB0AE-882B-4E70-AA9A-A2F21F30D447} Other System Modifications This Trojan deletes the following files: %User Temp%
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{161B953B-95F9-4af3-B071-D5FF5EA132EF}
Chrome Mozilla Firefox Internet Explorer Opera Browser Flock Browser RockMelt K-Meleon FastStone Browser It uses the following list of user names and passwords to access password-protected locations where
This spyware monitors the browser activities of the affected system, specifically the address bar. It may also insert additional fields in forms to obtain other information from the user. This
retrieve stored information such as user names, passwords, and hostnames from the following browsers: FastStone Browser Flock Browser Google Chrome Internet Explorer K-Meleon Mozilla Firefox Opera Browser
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
adware may be downloaded by other malware/grayware/spyware from remote sites. Autostart Technique This adware adds the following registry keys to install itself as a Browser Helper Object (BHO):
websites. It registers itself as a Browser Helper Object (BHO) to ensure its automatic execution every time Internet Explorer is run. It does this by creating registry keys/entries. It connects to certain
Pocomail Thunderbird Windows Live Mail Windows Mail It attempts to retrieve stored information such as user names, passwords, and hostnames from the following browsers: FastStone Browser Flock Browser Google
\CurrentVersion\Explorer\ Browser Helper Objects\{E9CE47C6-C8A4-3C5E-A985-FEBE6E3ED08A} Other System Modifications This Trojan deletes the following files: %User Temp%\nsd1.tmp %User Temp%\nsy3.tmp (Note: %User
Windows Live Mail Windows Mail It attempts to get stored information such as user names, passwords, and hostnames from the following browsers: FastStone Browser Flock Browser Google Chrome Internet Explorer
Bromium Nichrome RockMelt 360Browser Vivaldi Opera Sputnik Kometa Uran QIP Surf Epic Privacy CocCoc CentBrowser 7Star Elements TorBro Suhba Safer Browser Mustang Superbird Chedot Torch QQ Browser UC Browser
the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{78919608-B066-4B5A-B248-38E12A783E05} Other System Modifications This Trojan
the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{78919608-B066-4B5A-B248-38E12A783E05} Other System Modifications This Trojan
time Operating system and version UserID Default browser Installed browsers Browser Activities Installed Antivirus Other Details This adware connects to the following website to send and receive
This spam sample contains an advertisement for a free tax consultation. It claims that it can reduce the recipient's taxes by 88%. When clicked, the spam opens the victim's browser to a malicious
Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Other Details This Trojan connects to the following possibly malicious URL: http://{random}.