<div align="justify">Trend Micro threat researchers post findings and analyses on various threats in real-time at the Malware Blog. Users can find more information about this specific threat
here.
To get a one-glance comprehensive view of the behavior of this malware, refer to the Behavior Diagram shown below.
Malware Overview
This Trojan may be downloaded unknowingly by a user when visiting malicious Web sites.
It registers itself as a system service to ensure its automatic execution at every system startup.
It accesses Web sites to download and execute files detected as TROJ_MUTANT.EW. As a result, malicious routines of the downloaded files are exhibited on the affected system.
More...