Keyword: worm_prolaco.ab
15385 Total Search   |   Showing Results : 1 - 20
   Next  
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
Once recipients open the said file and view the e-card, their systems become infected. Trend Micro detects the malicious attached file as WORM_PROLAC.SME , WORM_PROLACO.AB , and WORM_PROLACO.AA . Please
This worm arrives as attachment to mass-mailed email messages. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It drops an
This description is based is a compiled analysis of several variants of WORM_PROLACO. Note that specific data such as file names and registry values may vary for each variant. This worm arrives as
This is the Trend Micro detection for Win32 Self-Extracting Cabinet files created by WORM_PROLACO.EK. The said file contains a copy of WORM_PROLACO.EK and an .EXE or .MSI file, which it finds in
This worm may be downloaded from remote sites by other malware. It may arrive via peer-to-peer network shares. It may be downloaded unknowingly by a user when visiting malicious Web sites. It arrives
This worm arrives as attachment to mass-mailed email messages. It arrives via removable drives. It adds registry entries to enable its automatic execution at every system startup. It drops an
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It uses icons similar to those of legitimate applications to
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives as attachment to mass-mailed email messages. It arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users
This worm drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation
This worm arrives as attachment to mass-mailed email messages. It executes the files it drops, prompting the affected system to exhibit the malicious routines they contain. Arrival Details This worm
Installation This worm drops the following copies of itself into the affected system: %Application Data%\SystemProc\lsass.exe (Note: %Application Data% is the current user's Application Data folder,
This worm arrives as attachment to mass-mailed email messages. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It drops copies of itself into all the removable drives connected to an affected system. It
This worm drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation
It adds registry entries to enable its automatic execution at every system startup. Autostart Technique It adds the following registry entries to enable its automatic execution at every system
This Trojan arrives as attachment to mass-mailed email messages. It drops copies of itself into all the removable drives connected to an affected system. It drops an AUTORUN.INF file to automatically
This is the Trend Micro detection for files that exhibit certain behaviors. Other Details This Trojan does the following: Drops and runs a copy of WORM_PROLACO.EK, as well as the .EXE or .MSI