Keyword: browser hijacker
4869 Total Search   |   Showing Results : 121 - 140
credentials from the following: Browsers (User Data): 360 Browser 7Star Amigo BlackHawk Brave CentBrowser Chedot Chrome Chromium Citrio Coccoc Comodo Dragon Cool Novo Coowon CyberFox Edge Chromium Elements
\Software\Microsoft\ Windows\CurrentVersion\Run Browser Extensions = "%User Profile%\BrowserExtensions\BEHelper.exe " Other System Modifications This Adware deletes the following files: %User Temp%\nse1.tmp
user clicking on a web browser advertisement. The purpose of this is to generate ‘clicks ’ for that advertisement even though there is no interest in the advertisement itself. The main beneficiary of
are inaccessible. Information Theft This Trojan Spy gathers the following data: Computer Name Username OS Version RAM Processor Info Login information from: 360 Browser 7Star Amigo Brave CentBrowser
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Autostart Technique This Trojan adds the following registry keys to install itself as a Browser
\autorun.inf %Current%\readme.htm NOTES: It retrieves the default browser of the affected system by querying the default value of the following registry key: HKEY_CLASSES_ROOT\http\shell\open\command It
packages. It is a component of other malware. It acts as a Browser Helper Object (BHO) that monitors a user's Internet-browsing habits. It requires its main component to successfully perform its intended
website and run when a user accesses the said website. Information Theft This spyware steals the following information: timezone running browser and version Adobe PDF plugin presence and version Adobe Flash
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{F33C5E79-B750-3EC1-9540-ED6324564D65}
\flash.exe" NOTES: This Trojan forces close chrome browser by taskkill command. The dropped component flash.exe installs chrome browser extension by dropping the above-mentioned files. It connects to the
Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{B87C079C-66E8-481C-8D8F-E9A486F617BF} Other System
Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{B87C079C-66E8-481C-8D8F-E9A486F617BF} Other System
Password from the following applications: 360 Browser 360Chrome 7Star Amigo BlackHawk Brave CentBrowser Chedot Chrome Chrome Plus Chromium Citrio Coccoc Comodo Dragon Cool Novo Coowon CyberFox Elements
{4CF9A0D2-ED75-40CB-98C0-36DF6A30E040} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ TypeLib\{A2D5957F-6D1A-44CE-BFBA-D448EAAB8781} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\
browser helper objects (BHOs). BHOs are commonly used by adware. With this, users may experience unwanted pop-up advertisements and URL redirections. This backdoor executes commands from a remote malicious
browser helper objects (BHOs). BHOs are commonly used by adware. With this, users may experience unwanted pop-up advertisements and URL redirections. This backdoor executes commands from a remote malicious
This backdoor queries the default web browser by accessing a registry entry. It has certain capabilities. This backdoor may be dropped by other malware. It connects to a website to send and receive
browser helper objects (BHOs). BHOs are commonly used by adware. With this, users may experience unwanted pop-up advertisements and URL redirections. This backdoor executes commands from a remote malicious
browser helper objects (BHOs). BHOs are commonly used by adware. With this, users may experience unwanted pop-up advertisements and URL redirections. This backdoor executes commands from a remote malicious
browser helper objects (BHOs). BHOs are commonly used by adware. With this, users may experience unwanted pop-up advertisements and URL redirections. This backdoor executes commands from a remote malicious