Keyword: browser hijacker
4884 Total Search   |   Showing Results : 1181 - 1200
Chrome Chromium ChromePlus Bromium Nichrome Comodo RockMelt K-Meleon Epic Browser FastStone Browser Stolen Information This spyware sends the gathered information via HTTP POST to the following URL:
{User preference} .) Web Browser Home Page and Search Page Modification This spyware modifies the Internet Explorer Zone Settings. Information Theft This spyware gathers the following data: Computer name
\Explorer\ Advanced Hidden = "1" (Note: The default value data of the said registry entry is {User preference} .) Web Browser Home Page and Search Page Modification This spyware modifies the Internet Explorer
Settings GlobalUserOffline = "0" Propagation This backdoor does not have any propagation routine. Backdoor Routine This backdoor executes the following commands from a remote malicious user: Monitor browser
\Explorer\ Browser Helper Objects\{1781C2EE-D12A-48C4-9484-CB0CA78D4824} Other System Modifications This Trojan deletes the following files: ~02FCC68A.tmp %User Temp%\zzzzzz.zzz (Note: %User Temp% is the
Modify system's host file Record sounds Open and close CD-ROM drive door Steal passwords Get torrent files Refresh Wifi Uninstall programs Manipulate the following: • Browser • Clipboard •
start=disabled It disables the following services by executing the following commands: sc config browser sc config browser start=enabled sc stop MongoDB sc config MongoDB start=disabled sc stop SQLWriter
executing the following commands: vssadmin delete shadows /all /quiet sc stop vss sc config vss start=disabled It disables the following services by executing the following commands: sc config browser sc
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\
its automatic execution every time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\explorer\ Browser Helper Objects\
) It adds the following registry keys: HKEY_CLASSES_ROOT\egmulhxk.msdn_hlp\Clsid HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects HKEY_CURRENT_USER
browser cookies. TrojanSpy:Win32/Ranbyus.G (Microsoft)
also utilize malware and browser attacks in the past to steal cookies. They do this to impersonate users on the websites they frequent, ‘fooling’ the website into automatically providing the compromised
also utilize malware and browser attacks in the past to steal cookies. They do this to impersonate users on the websites they frequent, ‘fooling’ the website into automatically providing the compromised
also utilize malware and browser attacks in the past to steal cookies. They do this to impersonate users on the websites they frequent, ‘fooling’ the website into automatically providing the compromised
also utilize malware and browser attacks in the past to steal cookies. They do this to impersonate users on the websites they frequent, ‘fooling’ the website into automatically providing the compromised
also utilize malware and browser attacks in the past to steal cookies. They do this to impersonate users on the websites they frequent, ‘fooling’ the website into automatically providing the compromised
also utilize malware and browser attacks in the past to steal cookies. They do this to impersonate users on the websites they frequent, ‘fooling’ the website into automatically providing the compromised
also utilize malware and browser attacks in the past to steal cookies. They do this to impersonate users on the websites they frequent, ‘fooling’ the website into automatically providing the compromised
also utilize malware and browser attacks in the past to steal cookies. They do this to impersonate users on the websites they frequent, ‘fooling’ the website into automatically providing the compromised