Keyword: OTORUN
390 Total Search   |   Showing Results : 381 - 390
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This worm drops the following copies of itself
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This worm drops the following copies of itself
This worm arrives by connecting affected removable drives to a system. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It deletes itself after execution. Installation This worm drops
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It deletes itself after execution. Installation This worm drops
This spyware may be dropped by other malware. It arrives as a component bundled with malware/grayware packages. It may be dropped by other malware. Arrival Details This spyware may be dropped by
This Trojan bears the file icons of certain applications to avoid easy detection and consequent removal. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
Description Name: AUTORUN - HTTP (Request) - Variant 17 . This is Trend Micro detection for packets passing through any network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some i...
Description Name: AUTORUN - HTTP (Request) - Variant 16 . This is Trend Micro detection for packets passing through HTTP network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual beh...