Update Date
02/25/2024

Class: WebToolbar

Toolbars enhance the capabilities of user software and are installed with the user’s consent. They are not malicious. However, some toolbars are installed along with other software components. These toolbars make use of special installers that employ a variety of methods to automatically receive permission to install a toolbar, e.g. flagging an “I agree” option by default. In order to warn users about attempts to install unwanted content, we detect as WebToolbar any toolbars being installed on users’ computers without their permission as well as the associated toolbar installers.

Read more

Platform: Win32

Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.

Family: WebToolbar.Win32.MyWebSearch.h

No family description

Examples

7DC8FD7FD79942A96B6C5CE9EA146794
7DE14A0B6E3F1DE9E91806948629B9BD
A1B14B73897C12825D4D994E9A817140
623867F750281DA0FE9EB12321B86713
6032BB848F2E9BC14D3B50071598656D

Tactics and Techniques: Mitre*

TA0004
Privilege Escalation

Adversaries may modify access tokens to operate under a different user or system security context to perform actions and bypass access controls. Windows uses access tokens to determine the ownership of a running process. A user can manipulate access tokens to make a running process appear as though it is the child of a different process or belongs to someone other than the user that started the process. When this occurs, the process also takes on the security context associated with the new token.


T1134
Access Token Manipulation

Adversaries may modify access tokens to operate under a different user or system security context to perform actions and bypass access controls. Windows uses access tokens to determine the ownership of a running process. A user can manipulate access tokens to make a running process appear as though it is the child of a different process or belongs to someone other than the user that started the process. When this occurs, the process also takes on the security context associated with the new token.


TA0005
Defense Evasion

Adversaries may modify access tokens to operate under a different user or system security context to perform actions and bypass access controls. Windows uses access tokens to determine the ownership of a running process. A user can manipulate access tokens to make a running process appear as though it is the child of a different process or belongs to someone other than the user that started the process. When this occurs, the process also takes on the security context associated with the new token.


T1134
Access Token Manipulation

Adversaries may modify access tokens to operate under a different user or system security context to perform actions and bypass access controls. Windows uses access tokens to determine the ownership of a running process. A user can manipulate access tokens to make a running process appear as though it is the child of a different process or belongs to someone other than the user that started the process. When this occurs, the process also takes on the security context associated with the new token.


* © 2025 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.