Keyword: TROJ_PSYME
44680 Total Search   |   Showing Results : 2781 - 2800
Other Details This Trojan does the following: Takes advantage of a vulnerability in certain versions of Adobe Acrobat and Reader to execute an arbitrary code, thus, compromising system security.
This Trojan exploits a known vulnerability in Adobe Reader and Acrobat in order to drop BKDR_TIDSERV.DM. As a result, the malicious routines of this backdoor are also exhibited on the infected
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This malware exploits different vulnerabilities in order to download other malicious files. As of this writing, the said sites are inaccessible. Arrival Details This Trojan may be downloaded from the
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. Arrival Details This Trojan may be downloaded by other malware/grayware/spyware from remote sites. Other Details
This Trojan may be downloaded from remote sites by other malware. Arrival Details This Trojan may be downloaded from remote site(s) by the following malware: any WORM_QAKBOT variant NOTES: It
This Trojan may arrive bundled with malware packages as a malware component. It may be downloaded by other malware/grayware/spyware from remote sites. It uses Windows Task Scheduler to create a
This Trojan arrives as a file that exports the functions of other malware/grayware. It may be dropped by other malware. Arrival Details This Trojan arrives as a file that exports the functions of
This Trojan has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown
This Trojan connects to a website to send and receive information. It deletes itself after execution. Installation This Trojan drops the following copies of itself into the affected system: %System%\
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also