Keyword: TROJ_PSYME
44680 Total Search   |   Showing Results : 2761 - 2780
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be dropped by other malware. It may be
Installation This Trojan drops the following copies of itself into the affected system: %User Profile%\Localdir\svchost.exe (Note: %User Profile% is the current user's profile folder, which is
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This Trojan may be unknowingly downloaded by a user
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: BKDR_GIBON.SMA Other Details This Trojan does the following: It executes the file
This Trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of
When executed, this Trojan accesses an adult site. This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It executes when a user accesses certain websites where it is
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan arrives as a
Installation This Trojan drops the following copies of itself into the affected system and executes them: %User Profile%\Application Data\Common Files\iexplore.exe (Note: %User Profile% is the
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It executes the dropped file(s). As a result, malicious routines of the
This is the Trend Micro detection for .XLS files that has embedded malicious .SWF . This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan
This Trojan may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It bears the file icons of certain applications to avoid easy detection and consequent
This Trojan executes then deletes itself afterward. It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Installation This
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan contains the following strings in its code: [AutoRun] open=BACKUP
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: This is the Trend Micro threat detection for AUTORUN.INF files that serve as autostart
This Trojan creates a folder in affected systems. Installation This Trojan creates the following folders: %User Profile%\Application Data\Microsoft\Media Player\DRM251 (Note: %User Profile% is the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan does the following: It loads and runs the file C:\Windows\system32