Search
Keyword: yahoo
following registry entries to enable its automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run Yahoo Messengger = "%System%\chrome.exe" It modifies the
This Backdoor connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It uses the default Windows folder icon
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor's logging and listening routines and alleged connection to a government agency are the subject of media interest in Germany. To get a one-glance comprehensive view of the behavior of
This Trojan opens a certain registry key. It then queries the data under a specific value for the subkeys under a certain key. For the paths that it finds, it will append a certain line. It will then
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
PRORAT is a family of backdoors that serves as a remote administration tool (RAT). Variants of this malware family first appeared in 2005. It opens random ports to establish connection with a remote
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
Dropping Routine This Trojan drops the following files: %User Temp%\skytmp.dll (Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local
This worm has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown
This spyware may be dropped by other malware. It steals sensitive information such as user names and passwords related to certain games. Arrival Details This spyware may be dropped by the following
This worm arrives via removable drives. It uses the default Windows folder icon to trick users into opening the file. Double-clicking the file executes this malware. It drops copies of itself in
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It drops copies of itself in removable
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This worm may be
This backdoor monitors the browsing activities of the user and logs keystroke when the user is accessing sites with certain strings. This backdoor arrives on a system as a file dropped by other
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It gathers certain information on the
This backdoor arrives as a component bundled with malware/grayware packages. It may be unknowingly downloaded by a user while visiting malicious websites. It is a component of other malware. It may
This malware is a component of another malware. It attaches itself to certain processes. It monitors the browsing activities of the user. It exectures certain commands from a remote malicious user.
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_HILOTI.EP NOTES: This javascript may be used to monitor browser activities in