Keyword: browser hijacker
4876 Total Search   |   Showing Results : 721 - 740
execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\
every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\
every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{520BCEBA-2E02-45C3-BA1B-38499F5D6B1C} Other
then adds/modifies the following registry entry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run JavaReal kallyer = "%System%:mskallyer.exe" This backdoor queries the default web browser
default web browser by accessing the following registry key: HKEY_CLASSES_ROOT\http\shell\open\command It then launches a hidden web browser process where it injects its code in the said process. The
ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003.) It drops the following non-malicious files: D:\Setup.exe - legitimate 360 Secure Browser component
UNRUY is a group of Trojans that are usually downloaded from the Internet, particularly from websites that host malicious Java applets. It modifies an affected system's registry to enable browser
UNRUY is a group of Trojans that are usually downloaded from the Internet, particularly from websites that host malicious Java applets. It modifies an affected system's registry to enable browser
execute files on the affected system Execute Command Shell List files on a directory Terminate Processes Retrieve stored login credentials from browser Steal stored Pidgin Accounts Perform keylogging
\Start Menu\Programs\Startup.) Backdoor Routine This backdoor executes the following commands from a remote malicious user: Steal information from a browser Open a browser and load a specific page Run a
Bnbase Bndef Bprotect BprotectEx BrnFileLock Browser Defender Update Service BsBackup BsBhvScan BsFileScan BsFire BsMailProxy BsMain BsScanner BsUpdate CAAMSvc CAISafe CSCrySec CSObjectsSrv
Outlook Pocomail Thunderbird Windows Live Mail Windows Mail This spyware attempts to get stored information such as user names, passwords, and hostnames from the following browsers: FastStone Browser Flock
hostnames from the following browsers: Google Chrome Mozilla Firefox Internet Explorer Opera Browser Flock Browser FastStone Browser It does not have rootkit capabilities. It does not exploit any
names, passwords, and hostnames from the following browsers: FastStone Browser Flock Browser Google Chrome Internet Explorer K-Meleon Mozilla Firefox Opera Browser RockMelt This spyware uses the following
Outlook Pocomail Thunderbird Windows Live Mail Windows Mail This spyware attempts to get stored information such as user names, passwords, and hostnames from the following browsers: FastStone Browser Flock
FastStone Browser Flock Browser Google Chrome Internet Explorer K-Meleon Mozilla Firefox Opera Browser RockMelt This spyware uses the following list of user names and passwords to access password-protected
create certain folders under the found paths. It also creates non-malicious files. This Trojan may hijack search results. It affects the Mozilla Firefox browser and specifically targets certain search