Keyword: worm_bropia
11018 Total Search   |   Showing Results : 1081 - 1100
This worm arrives by connecting affected removable drives to a system. It may be unknowingly downloaded by a user while visiting malicious websites. It drops an AUTORUN.INF file to automatically
The dropped AUTORUN.INF is detected by Trend Micro as Mal_Otorun1. This worm arrives as attachment to mass-mailed email messages. It arrives via removable drives. It drops an AUTORUN.INF file to
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It uses icons similar to those of legitimate applications to
This worm may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. However, as of this writing, the said sites are inaccessible. It drops copies
This worm is capable of sending messages containing a link pointing to a copy of itself via Facebook , Yahoo! Messenger and Windows Live Messenger . It tries to connect to a list of websites. If a
This worm can propagate through P2P applications. This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware.
connects to a URL to send and receive information. This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious
This worm may arrive via network shares. It uses brute force attack to gain access to password-protected shares. It has backdoor routines that allows this worm to compromise the system's security. It
It is capable of propagating via P2P shares. This worm connects to a website to send and receive information. Installation This worm drops the following copies of itself into the affected system:
replaces this legitimate file to enable its automatic execution at system startup. This worm arrives by connecting affected removable drives to a system. It may be dropped by other malware. It may be
This worm arrives by connecting affected removable drives to a system. It arrives via removable drives. It modifies registry entries to hide files with System and Read-only attributes. It drops an
removable drives, which is a shortcut file that redirects to its dropped copy. This worm arrives via removable drives. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This worm arrives by connecting affected removable drives to a system. It drops copies of itself into all the removable drives connected to an affected system. It drops an AUTORUN.INF file to
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It
This worm may be dropped by other malware. Arrival Details This worm may be dropped by other malware. Installation This worm drops the following files: %Current%\ipz-db.bin %Current%\log.txt
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes then deletes itself afterward. It modifies
This worm arrives via removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Arrival Details This worm
This worm deletes registry entries, causing some applications and programs to not function properly. It drops copies of itself in all removable drives. It deletes itself after execution. Installation
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It uses