Keyword: browser hijacker
4876 Total Search   |   Showing Results : 801 - 820
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
itself as a Browser Helper Object (BHO): HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440} It adds the following registry
used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{60D30B56-8DAA-471F-8369-70E9225379E5} Other System
executes then deletes itself afterward. Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Download Routine This Trojan accesses the following
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects Dropping Routine This Trojan drops the following files: %User Temp%\Install_freezone_search_180_B.exe %System%\win8710s.dll (Note:
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects Dropping Routine This Trojan drops the following files: %User Profile%\Application Data\fs1m32ef.dll %User Profile%\Application
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects Dropping Routine This Trojan drops the following files: %User Temp%\Install_freezone_search_180_B.exe %System%\win2806s.dll (Note:
\FireFox Description = "FireFox Browser Driver" Other Details This Trojan connects to the following possibly malicious URL: http://www.{BLOCKED}ya.com/din.htm It deletes itself after execution. This report
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_CURRENT_USER\SOFTWARE\!o@v@s!$a!@v! Dropping Routine This Trojan drops the following files: %User Profile%\Application Data
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects Dropping Routine This Trojan drops the following files: %User Profile%\Application Data\x6do91kj.dll %User Profile%\Application
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects Dropping Routine This Trojan drops the following files: %User Profile%\Application Data\ip4nkp98.dll %User Profile%\Application
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_CURRENT_USER\SOFTWARE\pre@ws$av It adds the following registry entries: HKEY_CURRENT_USER\Software\pre@ws$av name = "24OII1RB
\FireFox Description = "FireFox Browser Driver" Other Details This Trojan connects to the following possibly malicious URL: http://www.{BLOCKED}ya.com/din.htm It deletes itself after execution. This report
Details This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Web Browser Home Page and Search Page Modification This
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_CURRENT_USER\SOFTWARE\pre@ws$av It adds the following registry entries: HKEY_CURRENT_USER\Software\pre@ws$av name = "CGSWRK9J
keys: HKEY_CURRENT_USER\Software\iSetup.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} Other Details This Trojan
File Name}.exe" Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Other Details This Trojan connects to the following possibly malicious URL:
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{839741A2-B652-4685-A461-481D90915C0F}
\SOFTWARE\RelatedPageInstall HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects It adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE
opera.exe iexplore.exe firefox.exe facebookmessenger.exe chrome.exe NOTES: Once it finds the browser processes mentioned, it will look for the c_user and xs cookies to bypass Facebook authentication. Then, it