Search
Keyword: mal_otorun1
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This worm arrives by connecting affected removable drives to a system. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry entries to enable its automatic
This worm adds the following registry entries as part of its installation routine: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ exefile NeverShowExt = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
the following registry entries: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ HideDesktopIcons\ClassicStartMenu {871C5380-42A0-1069-A2EA-08002B30309D} = "1" HKEY_CURRENT_USER
This worm arrives by connecting affected removable drives to a system. It may be unknowingly downloaded by a user while visiting malicious websites. It drops copies of itself into all the removable
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\SharedAccess\Parameters\ FirewallPolicy\StandardProfile EnableFirewall = 0 (Note: The default value data of the said registry entry is 1 .) HKEY_LOCAL_MACHINE
registry entries: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ exefile NeverShowExt = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ CLSID\{Random GUID}\shell\ OpenHomePage\Command (Default Value) = "iexplore.exe
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm
entries to hide Hidden files: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced Hidden = 2 (Note: The default value data of the said registry entry is 1 .) HKEY_CURRENT_USER
This worm may be unknowingly downloaded by a user while visiting malicious websites. It drops copies of itself into all the removable drives connected to an affected system. It drops an AUTORUN.INF
\ Windows\CurrentVersion\policies\ Explorer NoFolderOptions = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System DisableRegistryTools = "1" HKEY_CURRENT_USER\Software\Microsoft
\CurrentVersion\Policies\ System DisableRegistryTools = 0 HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System DisableTaskMgr = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows
of the said registry entry is 1 .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced HideFileExt = 1 (Note: The default value data of the said registry entry is 0 .)
"1" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\One Start = "3" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\One ErrorControl = "1" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Trojan may be dropped by other malware. It automatically executes files when a user opens a drive. Arrival Details This Trojan may be dropped by other malware. Propagation The said .INF file
following registry entries as part of its installation routine: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Explorer NoFolderOptions = "1" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
This Trojan may be dropped by other malware. It automatically executes files when a user opens a drive. Arrival Details This Trojan may be dropped by other malware. Propagation The said .INF file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a