Search
Keyword: mal_otorun1
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It requires its main
This worm drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation This worm drops the following copies of itself
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN OTORUN Since these files commonly arrive and
This Trojan may be downloaded from remote sites by other malware. Arrival Details This Trojan may be downloaded from the following remote site(s): http://web.kfc.ha.cn:6668/Down/my/124.exe It may be
\ System DisableTaskMgr = "0" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ System DisableRegistryTools = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies
DisableRegistryTools = "1" HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Explorer NofolderOptions = "0" Propagation This worm drops copies of itself in the following shared folders: regsvr.exe
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\SYSTEM\CurrentControlSet\ Services\srv{random characters} Start = "2" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\srv{random characters} ErrorControl = "1" HKEY_LOCAL_MACHINE\SYSTEM
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN OTORUN Since these files commonly arrive and
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: WORM_AUTORUN OTORUN Since these files commonly arrive and
This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to WORM_AUTORUN variants. Files detected usually drop a copy of itself and AUTORUN.INF file
This is the Trend Micro heuristic detection for suspicious files that manifest behavior and characteristics similar to WORM_AUTORUN variants. Files detected usually drop a copy of itself and
\SharedAccess\Parameters\ FirewallPolicy\StandardProfile EnableFirewall = "0" (Note: The default value data of the said registry entry is 1 .) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\wscsvc Start =
\CurrentControlSet\ Services\srv{random hexadecimal number} Start = "1" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Services\srv{random hexadecimal number} ErrorControl = "1" HKEY_LOCAL_MACHINE\SYSTEM
value data of the said registry entry is 1 .) HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Explorer\ Advanced SuperHidden = 0 (Note: The default value data of the said registry entry is 1
HKEY_CLASSES_ROOT\exefile NeverShowExt = 1 HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\ Associations ModRiskFileTypes = .exe HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control