Keyword: browser hijacker
4876 Total Search   |   Showing Results : 881 - 900
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{839741A2-B652-4685-A461-481D90915C0F}
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{7AA59E5C-F496-4E5D-B80D-ED305BE7B4F9}
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{65988659-B93D-4EBB-8A80-750F8C0E492F}
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{88B26BA3-7C28-44DE-87AA-A49DA5282004}
\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_CURRENT_USER\SOFTWARE\pre@ws$av It adds the following registry entries: HKEY_CURRENT_USER\Software\pre@ws$av name = "7MMWTEG7
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Policies\ Ext\CLSID It adds the following registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Policies\ Ext\CLSID It adds the following registry entries:
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{0A2554CD-92CD-43A5-A04B-8E0E9C36C2B1}
Windows NT, and C:\Documents and Settings\{User name}\Start Menu\Programs\Startup.) Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Other Details
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{05DCD7B5-53FF-4D3A-91A8-27B4BB463436}
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{522FBA64-7812-4BDE-81FC-50075E4C7800}
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{DA810DE3-A101-402F-B085-2A36250A72D2}
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{F144F289-BCAC-400F-B0AB-68D5DC0ADE30}
\SOFTWARE\Microsoft\ Internet Explorer\Main Enable Browser Extensions = "No" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ WBEM\WDM %System%\advapi32.dll[MofResourceName] = "{random characters}" HKEY_LOCAL_MACHINE
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{638ED08B-99CB-4C53-B8FE-5A41FEF73F15}
\PWFlash.PowerFlash.1 It adds the following registry entries to install itself as a Browser Helper Object (BHO): HKEY_CLASSES_ROOT\CLSID\{DC888631-57F5-4AF4-86B3-BDE5F854DCBF} (Default) = "PowerFlash Class
URL using the default browser of the affected system Force the user to input login credentials Shutdown the remote computer Restart the remote computer Put the system into sleep mode Send a message
\PWFlash.PowerFlash.1 It adds the following registry entries to install itself as a Browser Helper Object (BHO): HKEY_CLASSES_ROOT\CLSID\{DC888631-57F5-4AF4-86B3-BDE5F854DCBF} (Default) = "PowerFlash Class
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{82172ADD-5938-4CE1-B5D3-B42324B0A487}
of the browser Get / set bookmarks Get / get shortcuts Get / set notification link, title, icon and text Trojan:AndroidOS/Plankton.gen!A (Microsoft), Android.Counterclank (Symantec), Andr/NewyearL-B