Keyword: TROJ_PSYME
44677 Total Search   |   Showing Results : 641 - 660
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware is loaded by HTML_EXPDROP.II. It attempts to connect to a site to download an archive file containing other files. The downloaded files are executed, loading other files detected as
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan executes the file ipconfig.exe . If unsuccessful, it will terminate itself. It has a routine that adds garbage data to the resource section of its dropped files, making their sizes vary.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives by being dropped by a specific malware. It modifies the affected system's registry in order to execute the malware it drops as a service. This Trojan may be dropped by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan comes with a .DLL file which is executed when Microsoft Word is successfully exploited. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or
This Trojan may be downloaded by other malware/grayware from remote sites. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan may be dropped by other malware. It uses a list of passwords to gain access to password-protected shares. It hacks a computer by running a command line. Arrival Details This Trojan may be
This Trojan may arrive as a file that exports functions used by other malware. It may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It requires its
This Trojan connects to possibly malicious URLs. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_ARTIEF.LOG Installation This Trojan drops the following component file(s): %User
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It executes then deletes itself
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not