Keyword: tspy_lineage
15224 Total Search   |   Showing Results : 1361 - 1380
This spyware hooks certain APIs to perform its malicious routines. It hooks functions in ws2_32.dll to intercept data. It then waits for the user to access an FTP site then steals the user name and
This spyware arrives as a file that exports the functions of other malware/grayware. It arrives as a component bundled with malware/grayware packages. It requires its main component to successfully
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be injected into processes running in memory.
This spyware attempts to replace the contact numbers of certain banks with rogue numbers that are controlled by the attackers. This may lead infected users to divulge their banking and personal
This spyware arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This spyware may be unknowingly downloaded by a user while visiting malicious websites. It terminates itself if it detects it is being run in a virtual environment. Arrival Details This spyware may
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is injected into all running processes to remain
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This spyware may be dropped by other malware. It may be
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It modifies the Internet Explorer Zone Settings. Arrival Details This spyware arrives as
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware deletes registry entries, causing some applications and programs to not function properly. It opens a hidden Internet Explorer window. It also has rootkit capabilities, which enables it
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware may be unknowingly downloaded by a user while visiting malicious websites. It modifies the Internet Explorer Zone Settings. It deletes the initially executed copy of itself. Arrival
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It contains errors in its code. This stops it from
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded