Keyword: worm_rbot.qp
11161 Total Search   |   Showing Results : 841 - 860
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It drops an AUTORUN.INF file to automatically
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies registry entries to hide
This worm arrives by connecting affected removable drives to a system. It drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops
EXPL_CPLNK.SM. This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It
The URL and LNK files this worm drops point to ttp://www.sfc007.com/ . This worm arrives via removable drives. It arrives by accessing affected shared networks. It drops copies of itself into network
This worm arrives by connecting affected removable drives to a system. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It drops
with this worm. It logs some of its activities in a file. This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This worm joins an Internet Relay Chat (IRC) channel. It executes commands from a remote malicious user, effectively compromising the affected system. It steals CD keys, serial numbers, and/or the
This worm arrives via removable drives. It is injected into all running processes to remain memory resident. It drops copies of itself into all the removable drives connected to an affected system.
This worm may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It drops copies of itself into network drives. It also has rootkit
This worm arrives as attachment to mass-mailed email messages. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It also has rootkit
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It may be dropped by other malware. It may be unknowingly downloaded by a user
peer-to-peer network which may then receive and send commands from/to other infected machines/malicious networks to download and execute other malicious files. This worm may be dropped by other malware. It may
below. This worm is also capable of performing denial of service (DoS) attacks on target systems. It receives commands from a remote server that is controlled by a malicious user to perform SYN flood
that executes this Javascript every 4 hours. It may also connect to IRC servers and receive commands from a remote user. This worm may be dropped by other malware. It may be unknowingly downloaded by a
located on the said parent folder for their file names. This worm arrives as attachment to mass-mailed email messages. It may be unknowingly downloaded by a user while visiting malicious websites. It uses
every system startup. This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites.
This worm arrives by connecting affected removable drives to a system. It deletes registry entries, causing some applications and programs to not function properly. It drops an AUTORUN.INF file to
It drops copies of itself into folders used for certain peer-to-peer applications. This worm arrives by connecting affected removable drives to a system. It may be dropped by other malware. It may be
This worm attempts to connect to certain URLs. Once a connection is established, it waits for commands from the remote user. This worm arrives via removable drives. It may be unknowingly downloaded