Keyword: browser hijacker
4876 Total Search   |   Showing Results : 1001 - 1020
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{16D299DE-28C3-4E1E-BD96-A65D82EDBB04}
\Microsoft\ Windows\CurrentVersion\policies\ system EnableLUA = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects NoExplorer = "1" Dropping Routine This Trojan
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\ Services\GbpKm HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{C41A1C0E-EA6C-11D4-B1B8-444553540000} This report is generated
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{9B753C26-9E77-4C96-B7A8-4ACB70025974}
\Microsoft\ Windows\CurrentVersion\policies\ system EnableLUA = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects NoExplorer = "1" Dropping Routine This Trojan
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{CAD8D56D-CED4-4C6E-925A-8A7392B83F66}
adds the following registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ MJ CLSID = "{Random Hex Values}" Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{202a961f-23ae-42b1-9505-ffe3c818d717}
\Microsoft\ Windows\CurrentVersion\policies\ system EnableLUA = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects NoExplorer = "1" Dropping Routine This Trojan
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{00009E9F-DDD7-AA59-AA7D-AA4B7D6BE000}
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{2E246FAE-8420-11D9-870D-000C2917DE7F}
\Microsoft\ Windows\CurrentVersion\policies\ system EnableLUA = "0" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects NoExplorer = "1" Dropping Routine This Trojan
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\{3D898C55-74CC-4B7C-B5F1-45913F123180}
analysis of the codes, it has the following capabilities: This hidden web browser process contains the backdoor component, which connects to the following remote server and wait for commands: {BLOCKED
keys: HKEY_CLASSES_ROOT\CLSID\{random CLSID}\ InprocServer32 (Default) = {malware path and file name}.DLL HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
/terminate It has the capability to do the following routines: Get / set bookmarks Get / set homepage of the browser Get / set notification link, title, icon and text Set / get shortcuts 12 for 2012: What Will
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{11111111-1111-1111-1111-110011491171}
User Startup folder to enable its automatic execution at every system startup: dxdiag.exe Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings.
adapter information Stored passwords in browsers and browser versions: Internet Explorer Firefox Chrome Stored email accounts and vesions of email applications: Outlook Express Windows Mail Windows Live
following URL: https://{BLOCKED}anotherrace.com/javascript/log3.php?logins=1 NOTES: This is a Google browser extension named IDKEY STOR . This malware looks for the following strings first before its