Keyword: browser hijacker
4884 Total Search   |   Showing Results : 1941 - 1960
widely used and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
ntldr ntuser.dat ntuser.dat.log ntuser.ini Opera Opera Software Program Files Program Files (x86) ProgramData thumbs.db Tor Browser Windows Windows.old It appends the following extension to the file name
can infect other machines on the same network Ransomware Routine This Ransomware avoids encrypting files with the following strings in their file name: Boot Windows Windows.old Tor Browser Tox Admin
Browser Windows Windows.old HowToRestoreYourFiles.txt {Log file name} It appends the following extension to the file name of the encrypted files: .Rook It drops the following file(s) as ransom note:
widely used and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
widely used and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
widely used and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
widely used and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
can infect other machines on the same network Ransomware Routine This Ransomware avoids encrypting files with the following strings in their file name: Boot Windows Windows.old Tor Browser Tox Admin
browser from the following URL: https://dist.{BLOCKED}ject.org/torbrowser/8.5.3/tor-win32-0.3.5.8.zip Ransomware Routine This Ransomware avoids encrypting files with the following strings in their file
widely used and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
widely used and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
widely used and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
widely used and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
widely used and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
widely used and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
widely used and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
system versions.) It executes then deletes itself afterward. Information Theft This Trojan Spy gathers the following information on the affected computer: Telegram session data Discord session data Browser
widely used and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.