Keyword: otorun2222222222
390 Total Search   |   Showing Results : 1 - 20
   Next  
This worm poses as a font file and uses the LNK vulnerability to propagate. There has also been an increase in customer infection because of this malware. To get a one-glance comprehensive view of
It is an AUTORUN.INF file that is used as an autostart component of the malware WORM_OTORUN.ASH. This component is usually dropped into shared folders, along with the main malware's copy. Upon
This worm deletes registry entries, causing some applications and programs to not function properly. It drops copies of itself in all removable drives. It deletes itself after execution. Installation
This description is based on the compiled analysis of several variants of WORM_OTORUN. Note that specific data such as file names and registry values may vary for each variant. This worm arrives by
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It may be dropped by other malware. It drops an AUTORUN.INF file to
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: WORM_OTORUN.ASH WORM_OTORUN.KR NOTES: This Trojan is a shortcut file (.LNK) that is
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This worm may be dropped by other malware. It drops copies of itself into network drives. Arrival Details This worm may be dropped by the following malware: TROJ_SFXMOT.A Installation This worm drops
This worm arrives via removable drives. It drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: This is the Trend Micro detection for AUTORUN.INF files dropped by WORM_OTORUN
This worm arrives via removable drives. It modifies certain registry entries to hide file extensions. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This worm drops the following copies of itself
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN OTORUN Since these files commonly arrive and
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It automatically executes files when a user opens a
This worm arrives by connecting affected removable drives to a system. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry entries to enable its automatic
This .INF file is created in removable drives to enable automatic execution of the worm once the drive is accessed. It contains certain strings. This Trojan may be dropped by other malware. Arrival
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: WORM_PALEVO.SMGA NOTES: This is the Trend Micro detection for AUTORUN.INF files
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: This is Trend Micro detection for autorun.inf files usually dropped by WORM_AUTORUN
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious