Threat Database Browser Hijackers

By ESGI Advisor in Browser Hijackers Image is a fairly simply website that gives off the appearance of being a search engine. However, has absolutely no real search capabilities. In fact, trying out a search on the search bar will simply result in a long list of advertisements, websites that are nothing but links and advertisements and results that are in no way relevant to the search carried out by the computer user. So, why would anyone want to use when there are reliable alternatives online such as Google, Yahoo or Bing? This is where the main danger of manifests itself. The fact is that most people visiting have absolutely no choice in the matter. This is because will usually be introduced aggressively by a browser hijacker on the victim's computer system. A browser hijacker will hijack the victim's web browser and force it to visit repeatedly, as well as carrying out other malicious tasks in order to ensure that the victim ends up at the website as often as possible. If you find that your web browser is compelling you to go to contrary to your will, this is a sure sign of a dangerous malware infection on your computer system. Use a reliable anti-malware application to hunt down browser hijackers on your hard drive and to stop all redirects to

Criminals do not use browser hijackers to force you to visit repeatedly for fun or simply to mess with your head. Rather, they do it so that they can profit from the vast amounts of traffic that can be artificially generated with the help of these malware infections. While most users would normally have absolutely no interest in using for their online searches, infecting as many computer users with a browser hijacker ensures a constant, artificially-generated stream of visitors arriving at the web page every day. This web traffic translates into advertising revenue and revenue generated from pay-per-click schemes. If you do not want criminals to profit from infecting your computer system with browser-hijackers, make sure that you protect your machine with a reliable security tool, a firewall and other security software. Also, make sure to follow basic online safety guidelines while browsing the Internet.

File System Details may create the following file(s):
# File Name Detections
1. %AppData%[trojan name]toolbarcouponsmerchants2.xml
2. %AppData%[trojan name]toolbarcouponsmerchants.xml
3. %AppData%[trojan name]toolbarguid.dat
4. %AppData%[trojan name]toolbaruninstallStatIE.dat
5. %AppData%[trojan name]toolbarversion.xml
6. %AppData%[trojan name]toolbarcouponscategories.xml
7. %AppData%[trojan name]toolbarstat.log
8. %AppData%[trojan name]toolbaruninstallIE.dat
9. %Temp%[trojan name]toolbar-manifest.xml
10. %AppData%[trojan name]toolbardtx.ini
11. %AppData%[trojan name]toolbarpreferences.dat
12. %AppData%[trojan name]toolbarstats.dat
13. %AppData%[trojan name]toolbarlog.txt

Registry Details may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{99079a25-328f-4bd4-be04-00955acaa0a7}InprocServer32 "C:PROGRA~1WINDOW~4ToolBar[trojan name]dtx.dll"
HKEY_LOCAL_MACHINESOFTWAREClasses[trojan name]IEHelper.DNSGuard.1
HKEY_LOCAL_MACHINESOFTWAREClasses[trojan name]IEHelper.DNSGuardCurVer
HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{99079a25-328f-4bd4-be04-00955acaa0a7} "[trojan name] Toolbar"
HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{A40DC6C5-79D0-4ca8-A185-8FF989AF1115} "UrlHelper Class"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{99079a25-328f-4bd4-be04-00955acaa0a7} "[trojan name] Toolbar"
HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{A40DC6C5-79D0-4ca8-A185-8FF989AF1115}ProgID "[trojan name]IEHelper.UrlHelper.1"
HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{A40DC6C5-79D0-4ca8-A185-8FF989AF1115}VersionIndependentProgID "[trojan name]IEHelper.UrlHelper"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerToolbar "[trojan name] Toolbar"


Most Viewed