Search
Keyword: yahoo
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. It attempts to s...
It sends messages that contain links to sites hosting remote copies of itself via the instant-messaging (IM) application, Yahoo! Messenger.This worm may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious...
This worm sends messages that contain links to sites hosting remote copies of itself using the instant-messaging (IM) applications Yahoo Messenger and MSN Messenger.It may also send messages containing malicious links using Facebook chat feature.It o...
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses Windows Task Scheduler to create a sc...
Windows 2000, XP, Server 2003
Dropping RoutineThis Trojan drops the following files: %User Temp%\skytmp.dll(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
Windows 98, ME, NT, 2000, XP, Server 2003
Other DetailsThis Spyware adds the following lines or registry entries as part of its routine: HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\Windows\CURRENTVERSION\Run\Yahoo Messengger%System%\SCVHOS...
This worm attempts to steal user credentials, such as user names and passwords, that are related to online games. It does this by monitoring processes/services in the memory that contains certain strings.It also steals Yahoo! Japan credentials by mo...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Backdoor connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts the computer at a greater risk of infection by oth...
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It disables Task Manager, Registry Editor, and Folder Options.
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. It attempts to ...