Keyword: OTORUN
390 Total Search   |   Showing Results : 61 - 80
This is the Trend Micro detection for specially crafted .LNK files that are used to execute malicious files once this shortcut is accessed.Once the user accesses this shortcut, it executes a file
This worm arrives by connecting affected removable drives to a system. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: This is Trend Micro detection for autorun.inf files usually dropped by WORM_AUTORUN
This worm arrives by connecting affected removable drives to a system. It arrives via removable drives. It drops copies of itself into all the removable drives connected to an affected system. It
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself. Arrival
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives by connecting affected removable drives to a system. It may be unknowingly downloaded by a user while visiting malicious websites. It drops copies of itself in all removable and
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the
This worm arrives by connecting affected removable drives to a system. It arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This worm may be unknowingly downloaded by a user while visiting malicious websites. It drops copies of itself into all the removable drives connected to an affected system. It drops an AUTORUN.INF
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This .INF file is created in removable drives to enable automatic execution of the worm once the drive is accessed. It contains certain strings. This Trojan may be dropped by other malware. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It requires its main
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It automatically
This Trojan an AUTORUN.INF component that is used by its main malware as an autostart technique. It executes a certain file. As a result, malicious routines of executed file are exhibited on the