Keyword: usoj_fakeav.blr
3711 Total Search   |   Showing Results : 41 - 60
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This is Trend Micro's smart detection for a group of FAKEAV variants. This is the Trend Micro detection for files that exhibit certain behaviors. It displays fake alerts that warn users of infection.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
attract users in search of more information on disasters. Cybercriminals employ poisoned search results to lead users to rogue antivirus or FAKEAV download pages. Apart from downloading FAKEAV, users may
themselves up in Moscow subway stations. Cybercriminals used this unfortunate incident to spread a FAKEAV variant using blackhat search engine optimization (SEO) techniques. Search engines like Google are
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It adds registry entries to enable its
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Trojan displays fake alerts upon installation. It displays fake scanning results about disk errors. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It poses as an antispyware application that uses pop-up
This Trojan is noteworthy as it tricks the user into purchasing the rogue product from a certain website asking for sensitive information, such as credit card numbers. To get a one-glance
Installation This Trojan drops the following files: %System Root%\Documents and Settings\All Users\Application Data\{random}\{random} - encypted component %User Desktop%\Smart Fortress 2012.lnk -
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It executes then deletes itself
compromises their financial accounts. These fake alerts will then lure the user to download a malicious FAKEAV executable from the site where it is hosted. As a result, malicious routines of the downloaded file
This is the Trend Micro detection for shortcut files (.LNK) used as a component by FAKEAV malware family. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by
(Fortinet) Searches for iCloud Unveil FAKEAV Displays windows, Connects to URLs/IPs, Steals information
This malware installs itself on the infected system as a rogue antivirus application using certain names that include the affected system's Operating System (OS). Should the user choose to purchase
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a