Keyword: tspy_lineage
15224 Total Search   |   Showing Results : 821 - 840
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It contains errors in its code. This stops it from
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses a file name similar to a legitimate file to
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses a file name similar to a legitimate file to
This spyware monitors the browser activities of the affected system, specifically the address bar. It may also insert additional fields in forms to obtain other information from the user. This
This spyware arrives as attachment to mass-mailed email messages. It does not have any propagation routine. It does not have any backdoor routine. It modifies the Internet Explorer Zone Settings. As
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It checks for the presence of the following processes
Installation This spyware drops the following copies of itself into the affected system: %Application Data%\{random1}\{random}.exe (Note: %Application Data% is the current user's Application Data
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies Internet Explorer security settings. This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. As of
This spyware may be unknowingly downloaded by a user while visiting malicious websites. As of this writing, the said sites are inaccessible. Arrival Details This spyware may be unknowingly downloaded
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies Internet Explorer security settings. This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings.
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies the Internet Explorer Zone Settings. It connects to certain
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This spyware is able to generate a number of domains. It is able to connect to any of its generated domains to download possibly malicious files. To get a one-glance comprehensive view of the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a