Malwarebytes uses “Hijack” as the detection name for a category of system changes that are typically made by malware.
The system changes detected as “Hijack” can be made in the Windows registry, but also in browser configuration files. Hijack detections are typically made by malware with the objective to run malware-related files or redirect the users browser to sites of the threat actors choosing.
Malwarebytes protects against items detected as Hijacks by stopping the malware trying to make the changes and using real-time protection to block these threats.
Malwarebytes can detect and remove Hijack. detections without further user interaction.
Should users wish to keep this program and exclude it from being detected in future scans, they can add the program to the exclusions list. Here’s how to do it.
If you want to allow the program to connect to the Internet, for example to fetch updates, also add an exclusion of the type Allow an application to connect to the internet and use the Browse button to select the file you wish to grant access.
Your intro to everything relating to cyberthreats, and how to stop them.