What kind of malware is “Hijack Display Properties”?

I recently installed an anti-malware program from malwarebytes.org after my Yahoo email account was hijacked. The program detected and removed the malware program "hijack display properties." Do you know whether that program has a key logging that would have allowed a third party to gain access to my Yahoo email account?

6 Answers

  • You have to assume that all malware today installs a keylogger as well as a "backdoor" - and it is very difficult for the legitimate anti-malware programs to keep up with all the variations the criminals are writing, it is difficult to detect, block, and remove the programs and the files. Sometimes it is faster - and more re-assuring - to simply reinstall the factory software on the hard drive and start over.

    A fresh installation (and full update) of your computer operating system means no keyloggers are present, and with that you could go onto Yahoo (and any other website) and change your passwords and security questions and know that anyone who recently hijacked your old passwords is now blocked from using those accounts.

    The Malwarebytes' AntiMalware is an excellent on-demand scanner. I assume you installed the free version; it does not provide real-time protection, you have to pay for that.

    You can install Microsoft Security Essentials to get real-time protection; it's a free program.

    You can also use Rescue CDs to provide scanning, as an alternative that does not require installing anti-virus software (and they won't conflict with any real-time anti-malware programs). Here are two versions:


    You can create a "Rescue CD" with AVG anti-virus software:


    AVG Offers Free Emergency Boot CD

    Carrie-Ann Skinner

    Mar 25, 2010 9:46 am

    The link:


    AVG Rescue CD

    A powerful toolset for rescue & repair of infected machines.


    You can create a "Rescue CD" with F-Secure anti-virus software:


    The Cleanest Malware Scan

    Lincoln Spector

    Apr 5, 2010 8:47 am

    The link:


    Boot Up Securely with the Rescue CD


    Using another computer, you download the ISO image. The file is not very large and downloads fast on broadband like DSL and cable. Then you burn the ISO image to a CD; most computers have software with their DVD/CD drives that can do this specialized burn.

    If you download both of these, each ISO image must be burned to a separate CD.

    Then you boot your computer with this disk. Since Windows does not run, any virus or spyware or trojans or crimeware or keyloggers or other malicious software called malware cannot run and take control of your computer.

    This is a Linux-type set of programs, and it does not give you a pretty interface - it's all text and you will have to use the keyboard to select what operations to do.


    Be aware that if these programs find and remove or quarantine malicious files, you might not be able to boot your computer into Windows; some malware corrupts essential Windows files to be able to gain control of the computer.


    The advantage to this type of anti-virus scanning is that since Windows does not start, any malware on your computer cannot take control. Many computers get more than one malware program installed on them; an anti-virus program like one of these two allows you to remove some of those malware programs and makes it easier for other anti-malware programs to remove the others.

    It's a never-ending battle.

    Saturday, April 10, 2010 at 02:05 pm CDT

  • 2

  • If it is asking you to "sign in to my yahoo" no, hijacker, Yahoo resets your security "time" to sign in whether it has been 24 hours, or you switch browsers, " It is a Security Feature to help Protect your account" Good Luck

  • Pum.hijack.displayproperties

  • there are alot of MALWARE that has the capablities of hijacking your email

  • For the best answers, search on this site https://shorturl.im/awl2E

    you have to sigh in for my Yahoo to display !

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts