How to Log a Browser Hijacker: Detecting, Tracking, and Documenting the Threat
Browser hijackers are among the most frustrating forms of malware precisely because they operate in plain sight — redirecting your searches, swapping your homepage, injecting ads — while quietly resisting removal. Logging a browser hijacker means creating a documented record of its behavior, its files, and its network activity. That record becomes essential for cleaning an infection thoroughly, reporting it, or understanding exactly how far it spread.
What "Logging" a Browser Hijacker Actually Means
Logging isn't a single action. It refers to capturing evidence across multiple layers:
- File system changes — new extensions, executables, or registry entries the hijacker created
- Network activity — domains it contacts, data it sends or receives
- Browser behavior — which settings were modified (homepage, default search engine, new tab URL, DNS-over-HTTPS settings)
- Process activity — background tasks keeping the hijacker alive after you think you've removed it
Each layer tells a different part of the story. A hijacker that only modifies browser settings leaves a different footprint than one that installs a persistent background service or modifies your hosts file.
Step 1: Capture the Browser's Current State Before Touching Anything
Before removing anything, document what's been changed. Rushing to clean first destroys the evidence trail.
In Chrome/Edge/Brave:
- Navigate to
chrome://extensions(oredge://extensions) and screenshot every installed extension, including ones you don't recognize - Check
chrome://settingsfor homepage, startup pages, and default search engine - Open
chrome://net-export/to start a network log — this captures all browser-level network traffic in a JSON file you can analyze later
In Firefox:
- Visit
about:addonsandabout:config— hijackers often modifybrowser.startup.homepageandbrowser.search.defaultenginenamedirectly in config - Firefox's built-in
about:networkingshows active connections
On any browser, export your current extensions list and settings to a text file. Some hijackers reinstall themselves within minutes of removal, so timestamps on your logs matter.
Step 2: Log Running Processes and Startup Entries
Browser hijackers often survive browser removal by anchoring themselves to the operating system.
On Windows:
- Open Task Manager → Details tab and look for unfamiliar processes tied to browser activity
- Use
msconfigor Task Scheduler to check startup entries — hijackers frequently register as scheduled tasks with names mimicking legitimate software - The Registry Editor (
regedit) paths to check:HKCUSoftwareMicrosoftWindowsCurrentVersionRunand the equivalentHKLMpath
On macOS:
- Check System Settings → General → Login Items
- Use Activity Monitor to identify unusual processes consuming network resources
- Review
/Library/LaunchAgentsand~/Library/LaunchAgents— hijackers on macOS commonly drop.plistfiles here to auto-restart
Logging these locations means copying the full path, filename, and any associated values — not just noting "something looked weird."
Step 3: Capture Network Traffic 🔍
This is where you see what the hijacker is actually doing with your data.
Tools commonly used for network logging:
| Tool | Platform | What It Captures |
|---|---|---|
| Wireshark | Windows / macOS / Linux | All network packets at the interface level |
| Fiddler / Charles Proxy | Windows / macOS | HTTP/HTTPS traffic from browsers |
Chrome Net Export (chrome://net-export/) | Chrome-based browsers | Browser-specific DNS, socket, and HTTP logs |
| Little Snitch | macOS | Per-app outbound connection logging |
| Windows Firewall log | Windows | Blocked and allowed connection attempts |
The goal is to capture which domains the hijacker contacts, at what intervals, and whether it's exfiltrating anything. DNS queries are particularly revealing — a hijacker may contact its command-and-control infrastructure even when the browser appears idle.
Step 4: Document File System Changes
On Windows, tools like Autoruns (from Microsoft Sysinternals) give a comprehensive view of everything configured to run automatically — far more thorough than Task Manager alone. Running Autoruns before and after a suspected infection gives you a diff of what changed.
For file system logging more broadly:
- Windows:
sfc /scannowlogs system file integrity issues; Process Monitor (also Sysinternals) captures real-time file, registry, and process activity - macOS:
fs_usagein Terminal logs file system calls in real time - Both platforms: Antivirus scan logs from tools like Malwarebytes create structured records of detected files with paths and threat classifications
Save every log with a timestamp in the filename. If you're dealing with a persistent hijacker across multiple removal attempts, the timeline matters.
Step 5: Cross-Reference Against Known Threat Databases
Once you've captured file names, domains, and process names, you can identify what you're dealing with.
- VirusTotal — upload suspicious files or paste domain names to check against 70+ security engines
- URLhaus and Urlscan.io — look up domains the hijacker contacted
- Any.run or Hybrid Analysis — behavioral sandboxes where you can run a suspicious file and watch it log its own activity in a controlled environment
These tools don't replace your logs — they help contextualize them. A domain flagged by 40 out of 72 engines on VirusTotal tells you something meaningful about severity and family classification.
The Variables That Shape What You'll Find
How useful your logs are — and what you'll find in them — depends on factors specific to your situation:
- Your OS and its version — logging tools, accessible paths, and registry structures differ significantly between Windows 10, Windows 11, and various macOS versions
- Technical comfort level — Wireshark is powerful but produces raw packet data that requires interpretation; Chrome's net-export logs are more accessible but narrower in scope
- How long the infection has been active — a hijacker running for weeks may have already exfiltrated data, modified more settings, or downloaded secondary payloads
- Whether the hijacker has rootkit-like components — some advanced hijackers hide processes from standard Task Manager views, requiring specialized tools like GMER or Rootkit Revealer
- Managed vs. personal devices — enterprise-managed browsers have policy-controlled settings that can mask hijacker activity or prevent certain logging tools from running
A technically confident user on a personal Windows 11 machine with full admin access can run the full logging stack. A non-technical user on a locked-down work laptop will need to involve IT — and the logging process looks completely different in that context.
What you're able to capture, and what that data means for your next step, depends entirely on which of those situations describes your setup. 🔐