Keyword: tspy_lineage
15224 Total Search   |   Showing Results : 901 - 920
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies the Internet Explorer Zone Settings. It connects to certain
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies the Internet Explorer Zone Settings. It connects to certain
This spyware arrives as an attachment to email messages spammed by other malware/grayware/spyware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry entries to enable its automatic execution at every system
It modifies registry entries to enable its automatic execution at every system startup. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It adds registry entries to enable its automatic execution at
It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry entries to enable its automatic execution at every system startup.
It modifies registry entries to enable its automatic execution at every system startup. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
BLOCKED: http://padreim.ru/wbc/avg/index.php This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It connects to a website to send and receive
This spyware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it comes from spam
This spyware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it comes from spam
This spyware may be dropped by other malware. It acts as a Browser Helper Object (BHO) that monitors a user's Internet-browsing habits. Arrival Details This spyware may be dropped by other malware.
This Trojan arrives as a file that exports the functions of other malware/grayware. It may be dropped by other malware. It requires its main component to successfully perform its intended routine.
Other System Modifications This Trojan deletes the following files: %System%\Verclsid.exe (Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It attempts to steal sensitive online banking information, such as user names and
Other Details This spyware does the following: Monitors the running processes on the affected system. It also renames executable files of the running process by removing their file name extensions
This spyware may connect to a remote site to send and receive information. It may also download possibly malicious files. The gathered information may be sent to a remote malicious user. However, it
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It connects to a website to send and receive information. It modifies the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It may be injected into processes running in memory. It attempts to steal