Keyword: browser hijacker
4876 Total Search   |   Showing Results : 561 - 580
Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Other Details This Trojan connects to the following possibly malicious URL: http://{random}.
downloaded unknowingly by users when visiting malicious sites. Web Browser Home Page and Search Page Modification This Trojan modifies Internet Explorer zone settings. Other Details This Trojan connects to the
deletes itself after execution. Arrival Details This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Web Browser
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{AFD4AD01-58C1-47DB-A404-FBE00A6C5486} Other System Modifications This Trojan adds the following registry keys as part of
keys as part of its installation routine: HKEY_CURRENT_USER\Software\K8CE6CA1JO Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Microsoft:
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{99ED9674-A61B-4E2D-B842-9189001A92AF}
/optout /shorcuts /terminate /unexpectedexception It has the capability to do the following routines: get / set bookmarks get / set homepage of the browser get / set notification link, title, icon and text
Micro Customers You may download, install, and scan your system with HouseCall , our highly popular and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser
\CurrentVersion\Internet Settings WarnOnIntranet = "0" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings GlobalUserOffline = "0" Web Browser Home Page and Search Page Modification This
is Trend Micro detection for specially crafted .SWF file that takes advantage of the following vulnerability in certain versions of Adobe Flash Player : CVE-2011-2110 The Trojan checks if the browser
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{4E8D6551-F9A4-6D01-4D4B-BFD7673C0E3E}
antivirus processes Manipulate files Connect to C&C server Send and receive backdoor commands Gather the following information: System information File System information Network information Browser User
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects Dropping Routine This Trojan drops the following files: %Windows%\win000.tmp (Note: %Windows% is the Windows folder, which is
\Microsoft\ Internet Explorer\Main NoProtectedModeBanner = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Internet Settings DisableCachingOfSSLPages = "0" Web Browser Home Page and Search
Application requires its main component to successfully perform its intended routine. It does the following: Possibly redirects the home page of Internet Explorer Browser to the metacrawler search page:
Description Name: IE EXPLOIT CVE-2015-0072 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network behavior is likely ...
Description Name: OSVDB-89030 - Foxit Reader Plugin for Firefox URL String Stack Buffer Overflow . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The ho...
Description Name: CVE-2010-3563 - Sun Java Web Start BasicServiceImpl Code Execution Exploit . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host e...
malicious sites. Web Browser Home Page and Search Page Modification This dialer modifies the Internet Explorer Zone Settings. Other Details This dialer connects to the following possibly malicious URL:
every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\