Search
Keyword: TROJ_PSYME
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_ARTIEF.LOG Installation This Trojan drops the following component file(s): %User
This Trojan executes the files it drops, prompting the affected system to exhibit the malicious routines they contain. Arrival Details This Trojan may be downloaded from the following remote sites:
This Trojan may be downloaded by other malware/grayware from remote sites. It may be downloaded from remote sites by other malware. It executes the dropped file(s). As a result, malicious routines of
This is a Windows Help (.HLP) file that is specially crafted to drop a malicious file. When executed, it shows a blank Windows Help window. This Trojan arrives as attachment to mass-mailed email
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It modifies
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives as a file that exports the functions of other malware/grayware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This Trojan sets the attributes of all files in the affected system into Hidden to trick the users that the files have been deleted. It displays fake alerts upon installation. If the Buy license now
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It deletes the initially executed copy of itself. Arrival Details This Trojan arrives as
This Trojan opens a certain registry key. It then queries the data under a specific value for the subkeys under a certain key. For the paths that it finds, it will append a certain line. It will then
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan may arrive as a file that exports functions used by other malware. It may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It requires its
This Trojan may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the
This Trojan opens the non-malicious .PDF document so that the user does not suspect of any malicious activity in the system. This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It takes advantage of software vulnerabilities