Keyword: worm_bropia
11018 Total Search   |   Showing Results : 141 - 160
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
of this Worm, refer to the Threat Diagram shown below. This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This worm arrives via peer-to-peer (P2P) shares. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
Trend Micro has flagged this worm as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it has a complex structure that enables it to evolve
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This worm has received attention from independent media sources and/or other security firms. To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the default Windows folder icon to trick users
This worm may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It also has rootkit capabilities, which enables it to hide its processes and
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself into network drives. It also has
This worm arrives as attachment to mass-mailed email messages. It arrives via removable drives. It uses the default Windows folder icon to trick users into opening the file. Double-clicking the file
This worm arrives as attachment to mass-mailed email messages. It may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting
This worm accesses websites to download files detected by Trend Micro as: TROJ_FAKEAV.SM8 TROJ_RIMECUD.DL WORM_RIMECUD.SMC This worm arrives via removable drives. It drops an AUTORUN.INF file to
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It executes then deletes itself afterward. It modifies registry entries to hide files
This Worm drops a file in the Windows Common Startup folder to enable its automatic execution at every system startup. It terminates certain processes if found running in the affected system's