Keyword: OTORUN
390 Total Search   |   Showing Results : 81 - 100
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. Other Details This Trojan contains the following strings in its code: [AutoRun] open=BACKUP
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This worm drops the following copies of itself
This worm arrives via removable drives. It may be dropped by other malware. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected
The dropped file is injected in all running processes. Installation This worm drops the following copies of itself into the affected system: %Program Files%\Common Files\Microsoft Shared\explorer.exe
This Trojan creates a folder in affected systems. Installation This Trojan creates the following folders: %User Profile%\Application Data\Microsoft\Media Player\DRM251 (Note: %User Profile% is the
This worm drops copies of itself into all the removable drives connected to an affected system. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It
Heuristic Detection This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN If your Trend Micro
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the
This Trojan may be dropped by other malware. It automatically executes files when a user opens a drive. Arrival Details This Trojan may be dropped by other malware. Propagation The said .INF file
This Trojan may be dropped by other malware. It automatically executes files when a user opens a drive. Arrival Details This Trojan may be dropped by other malware. Propagation The said .INF file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It requires its main
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It requires its main
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This is the Trend Micro heuristic detection for suspicious files that manifest behavior and characteristics similar to WORM_AUTORUN variants. Files detected usually drop a copy of itself and
This Trojan may be dropped by other malware. It automatically executes files when a user opens a drive. Arrival Details This Trojan may be dropped by other malware. Propagation The said .INF file
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself
This Trojan may be dropped by other malware. It automatically executes files when a user opens a drive. Arrival Details This Trojan may be dropped by other malware. Propagation The said .INF file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a