Keyword: mal_otorun1
55778 Total Search   |   Showing Results : 41 - 60
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This worm drops the following copies of itself
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN OTORUN Since these files commonly arrive and
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
DisableRegistryTools = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Explorer NofolderOptions = "0" Propagation This worm drops copies of itself in the following shared folders: regsvr.exe
This Trojan may be downloaded from remote sites by other malware. Arrival Details This Trojan may be downloaded from the following remote site(s): http://web.kfc.ha.cn:6668/Down/my/124.exe It may be
\ System DisableTaskMgr = "0" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System DisableRegistryTools = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
\SYSTEM\CurrentControlSet\ Services\srv{random characters} Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\srv{random characters} ErrorControl = "1" HKEY_LOCAL_MACHINE\SYSTEM
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN OTORUN Since these files commonly arrive and
This is the Trend Micro heuristic detection for suspicious files that manifest behavior and characteristics similar to WORM_AUTORUN variants. Files detected usually drop a copy of itself and
This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to WORM_AUTORUN variants. Files detected usually drop a copy of itself and AUTORUN.INF file
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN OTORUN Since these files commonly arrive and
\SharedAccess\Parameters\ FirewallPolicy\StandardProfile EnableFirewall = "0" (Note: The default value data of the said registry entry is 1 .) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\wscsvc Start =
\CurrentControlSet\ Services\srv{random hexadecimal number} Start = "1" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\srv{random hexadecimal number} ErrorControl = "1" HKEY_LOCAL_MACHINE\SYSTEM
value data of the said registry entry is 1 .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced SuperHidden = 0 (Note: The default value data of the said registry entry is 1
HKEY_CLASSES_ROOT\exefile NeverShowExt = 1 HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Associations ModRiskFileTypes = .exe HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control