Keyword: yahoo
830 Total Search   |   Showing Results : 21 - 40
This worm sends messages that contain links to sites hosting remote copies of itself using the instant-messaging (IM) applications Yahoo Messenger and MSN Messenger . It may also send messages
\CurrentVersion\Setup Version = "83" Dropping Routine This worm drops the following files: %System%\winxcfg.exe %System%\macromd\AOL, MSN, Yahoo mail password stealer.exe %System%\macromd\XXX Porn Passwords.exe
worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Yahoo Messengger = "%System%
view wb weather ww xml yahoo ylt Downloaded from the Internet, Dropped by other malware Connects to URLs/IPs
worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Yahoo Messengger = "%System%
name}\AppData\Roaming on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit).) It creates the following folders: %User Profile%\ICQ %User Profile%\AppData %User Profile%\Yahoo %System
DONBOT, also known as BUZUS or BACHSOY is a botnet notorious for spamming emails. It also spammed shortened URLs via instant messaging applications such as Yahoo Messenger and MSN to spread malicious
This Trojan adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Explorer\Run yahoo = "
worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Yahoo Messengger = "%System%
Yahoo = "%Application Data%\bvuiwvdr\utatacbt.exe" Other Details This Trojan deletes itself after execution. NOTES: It connects to the following URL: http://www.msn.com/ TrojanDownloader:Win32/Dofoil.W
every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Yahoo Messengger = "%System%\scvhost.exe" It modifies the following registry entries to ensure it automatic execution
Yahoo Messenger Email Clients: Becky! Internet Mail Eudora Forte GroupMail Mail Commander Mail.Ru Agent Microsoft Outlook POP Peeper PocoMail Scribe The Bat! Vypress Auvis Windows Live Mail Poker game
worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Yahoo Messengger = "%System%
gathers login credentials Internet Explorer Firefox Google Chrome Opera Safari Yahoo Messenger MSN Messenger Pidgin FileZilla Internet Download Manager JDownloader Trillian Outlook Express Microsoft Outlook
the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Yahoo Messengger = "%System%\system3_.exe
also steals Yahoo Japan credentials by monitoring certain URLs, processes, and registry key. It deletes the initially executed copy of itself. This worm arrives via removable drives. It arrives on a
Bing Google Yahoo It also affects Mozilla Firefox web browser. The search queries redirect to the following website: http://{BLOCKED}.{BLOCKED}.161.29:8180/feed/go.php 12 for 2012: What Will The New Year
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Yahoo Messengger = "%System%\scvhost.exe" It modifies the following registry entries to ensure it automatic execution at every system startup:
HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Yahoo Messengger = "%System%\scvhost.exe" It modifies the following registry entries to ensure it automatic execution at every system startup:
worm adds the following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Yahoo Messengger = "%System%