Keyword: tspy_zbot.ccm
18131 Total Search   |   Showing Results : 961 - 980
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware modifies Internet Explorer security settings. This puts the affected computer at greater risk, as it allows malicious URLs to be accessed by the computer. Installation This spyware drops
This spyware connects to a certain URL to download its configuration file. As of this writing, the said site is inaccessible. This spyware may be unknowingly downloaded by a user while visiting
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This spyware deletes registry entries, causing some applications and programs to not function properly. It opens a hidden Internet Explorer window. It also has rootkit capabilities, which enables it
This spyware modifies the Internet Explorer Zone Settings. As of this writing, the said sites are inaccessible. Installation This spyware drops the following files: %User Profile%\Application Data\
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spywaremay arrive via spammed messages containing links where copies of it may be downloaded. It steals sensitive online credentials related to online banking by monitoring browser activity. It
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies the Internet Explorer Zone Settings. It connects to certain
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It contains errors in its code. This stops it from
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. Arrival
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival
This spyware arrives as an attachment to spammed messages pretending to be from Fidelity Investments. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware may be unknowingly downloaded by a user while visiting malicious websites. It does not have any propagation routine. It does not have any backdoor routine. It modifies the Internet