Keyword: browser hijacker
4884 Total Search   |   Showing Results : 1421 - 1440
RockMelt K-Meleon Epic Browser FastStone Browser Stolen Information This spyware sends the gathered information via HTTP POST to the following URL: http://{BLOCKED}i.{BLOCKED
Nichrome Comodo RockMelt K-Meleon Epic Browser FastStone Browser Stolen Information This spyware sends the gathered information via HTTP POST to the following URL: http://{BLOCKED
\explorer\ Browser Helper Objects\{4B9C301F-E1D7-41E6-9706-B35195D88338} Other System Modifications This Trojan deletes the following files: %Application Data%\finalget\tmp1.tmp %User Temp%\DZ_2.tmp
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{946405B5-04A9-4B40-AC64-D466FCD779A5}
{malware name}.dll" It adds the following registry keys as part of its installation routine: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{random CLSID}
Uninstall programs Start and control chat sessions Monitor activity by Remote Desktop Protocol DDOS Flooding Manipulate the following: Browser Clipboard Desktop Dialog Box Files Folders Mouse clicks Processes
passwords, and hostnames from the following browsers: Opera Mozilla Firefox SeaMonkey Flock Google Chrome Chromium ChromePlus Bromium Nichrome Comodo RockMelt K-Meleon Epic Browser FastStone Browser Stolen
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{5A9831BE-1683-41DE-AA2B-0580D8C63665}
time Internet Explorer is used by adding the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{2CB37E5D-AC40-44DC-91B3-211166B58EB9}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser
Browser FastStone Browser Stolen Information This spyware sends the gathered information via HTTP POST to the following URL: http://{BLOCKED}leponic.pw/gate.php http://{BLOCKED}icjunior.pw/gate.php Other
Chrome Chromium ChromePlus Bromium Nichrome Comodo RockMelt K-Meleon Epic Browser FastStone Browser Stolen Information This spyware sends the gathered information via HTTP POST to the following URL:
}e-veza.sk/Owm50c.php {BLOCKED}om.tr/prkdzF.php {BLOCKED}rga.co/L8HU29.php {BLOCKED}lescorts4u.com/XqVFBm.php {BLOCKED}odalari.net/GnOLXh.php {BLOCKED}everka.sk/6RGZgC.php {BLOCKED}ociort.ro/6sZTLc.php Web Browser Home
K-Meleon Epic Browser FastStone Browser Stolen Information This spyware sends the gathered information via HTTP POST to the following URL: http://{BLOCKED}.136.74:8080/ponyb/gate.php http://{BLOCKED
RockMelt K-Meleon Epic Browser FastStone Browser Stolen Information This spyware sends the gathered information via HTTP POST to the following URL: http://{BLOCKED}i.{BLOCKED
vulnerability could allow elevation of privilege if an attacker reflects specially crafted JavaScript back to the browser of a targeted user. Read more here . (MS13-104) Vulnerability in Microsoft Office Could
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\Explorer\ Browser Helper Objects\{8271B5D6-76D3-4ABF-AEB3-1721161C76BC} Other System Modifications This adware deletes the following files: %User Temp%
Chrome Chromium ChromePlus Bromium Nichrome Comodo RockMelt K-Meleon Epic Browser FastStone Browser Stolen Information This spyware sends the gathered information via HTTP POST to the following URL:
such as user names, passwords, and hostnames from the following browsers: Bromium ChromePlus Chromium Comodo Epic FastStone Browser Flock Browser Google Chrome Internet Explorer K-Meleon Mozilla Firefox
information: http://{BLOCKED}rve.info/b/order.php Web Browser Home Page and Search Page Modification This Trojan modifies the Internet Explorer Zone Settings. Download Routine This Trojan accesses the following