Class: WebToolbar
Toolbars enhance the capabilities of user software and are installed with the user’s consent. They are not malicious. However, some toolbars are installed along with other software components. These toolbars make use of special installers that employ a variety of methods to automatically receive permission to install a toolbar, e.g. flagging an “I agree” option by default. In order to warn users about attempts to install unwanted content, we detect as WebToolbar any toolbars being installed on users’ computers without their permission as well as the associated toolbar installers.Read more
Platform: Win32
Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.Family: Perion
No family descriptionExamples
2A449C33F44BA73253E8C6E8A9F3DA9C00C2622ED9DEE6EA9B837053122BBCEF
F0D4046B2DFFFFC0456387C89FEDD313
90227360A012C5946DED2D9D3D7EA697
409072489EA07B632C8F21395433EFD4
Tactics and Techniques: Mitre*
Adversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques to aid in persistence and execution.
Adversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques to aid in persistence and execution.
Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage. Changes could be disabling the entire mechanism as well as adding, deleting, or modifying particular rules. This can be done numerous ways depending on the operating system, including via command-line, editing Windows Registry keys, and Windows Control Panel.
* © 2025 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.