Keyword: browser hijacker
4876 Total Search   |   Showing Results : 841 - 860
browser to access the following URL: http://www.facebook.com Trojan-Downloader.VBS.BitMin.d (Kaspersky) Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs, Downloads files
following processes: "C:\Windows\System32\notepad.exe" C:\How_to_decrypt_files.txt Web Browser Home Page and Search Page Modification This Ransomware modifies the Internet Explorer Zone Settings. Other
Values}" Web Browser Home Page and Search Page Modification This backdoor modifies the Internet Explorer Zone Settings. Other Details This backdoor connects to the following possibly malicious URL: http://
keys: HKEY_CURRENT_USER\Software\iSetup.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} Other Details This Trojan
tool is used to recover the following: Email passwords Stored Internet Explorer passwords Web browser passwords It may save the recovered password to any location specified by the user. It may accept the
following file(s) in the Windows Startup folder to enable its automatic execution at every system startup: banner.lnk Web Browser Home Page and Search Page Modification This spyware modifies the Internet
in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. Apache Software Foundation
This security update addresses a vulnerability in Microsoft .NET Framework, which may lead to information disclosure once user views a malicious web page via a browser that runs XBAPs. Windows XP
following: It displays the following images to lure the user and redirect their browser to a malicious link: However, as of this writing, the said sites are inaccessible. Trojan.PDF.Phishing (IKARUS)
browser to the following non-malicious webpage after 3 login attempts: https://{BLOCKED}mail.{BLOCKED}ya.com/ It does not exploit any vulnerability. Trojan:HTML/Phish!MSR (MICROSOFT) Downloaded from the
browser to the following non-malicious webpage after 3 login attempts: https://{BLOCKED}mail.{BLOCKED}ya.com/ It does not exploit any vulnerability. Trojan:HTML/Phish!MSR (MICROSOFT) Downloaded from the
→ View Page Source If the user opened the Developer Tools or Inspect element tool via other means, it redirects the browser to the following website: https://www.microsoft.com PDF:PhishingX-gen [Phish]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{70FEAD04-A7FD-4B89-B814-8A8251C90EF7} Other System Modifications This Trojan deletes the following files: %User Temp%
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
ensure its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
ensure its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
required file to run gpg Combined binaries of %User Temp%\collapse.btc and %User Temp%\tobi.btc to %User Temp%\ttl.exe - Browser password dumper %User Temp%\lsass.btc to %User Temp%\lsass.exe - Email
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{5F8C8A31-F802-3FC8-B271-953BAD6D29E4} Other System