Keyword: worm_rbot.qp
11161 Total Search   |   Showing Results : 1421 - 1440
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It drops copies of itself in removable drives. These dropped copies use the
It adds the Image File Execution Options registry entries to automatically execute itself whenever certain applications are run. This worm arrives via removable drives. It may be downloaded by other
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses
It is capable of propagating via P2P shares. This worm connects to a website to send and receive information. Installation This worm drops the following copies of itself into the affected system:
This worm may be dropped by other malware. Arrival Details This worm may be dropped by other malware. Installation This worm drops the following files: %Current%\ipz-db.bin %Current%\log.txt
This worm arrives via removable drives. It drops copies of itself into all the removable drives connected to an affected system. It drops an AUTORUN.INF file to automatically execute the copies it
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It adds key(s)/entry(ies) to allow itself to run
This worm arrives by connecting affected removable drives to a system. It drops copies of itself into all the removable drives connected to an affected system. It drops an AUTORUN.INF file to
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It modifies
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
It monitors certain processes to steal user credentials. This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly
This worm arrives by connecting affected removable drives to a system. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It drops an
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It drops an AUTORUN.INF file to
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It uses
This worm executes then deletes itself afterward. It modifies registry entries to hide files with System and Read-only attributes. It drops an AUTORUN.INF file to automatically execute the copies it
It drops .LNK files in all removable drives which are shortcut files to the dropped copy. This worm arrives via removable drives. It may be dropped by other malware. It may be unknowingly downloaded
This worm arrives by connecting affected removable drives to a system. It may be unknowingly downloaded by a user while visiting malicious websites. It drops an AUTORUN.INF file to automatically
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This worm may be
This worm is capable of sending messages containing a link pointing to a copy of itself via Facebook , Yahoo! Messenger and Windows Live Messenger . It tries to connect to a list of websites. If a