Keyword: usoj_fakeav.blr
3711 Total Search   |   Showing Results : 121 - 140
This Trojan executes then deletes itself afterward. Installation This Trojan drops the following file(s)/component(s): %System%\68c0bb68f02a.dll - also detected as TROJ_FAKEAV.DJK (Note: %System% is
APIs so that it will be difficult to debug and remove from the system. In addition, KULUOZ downloads other malware like FAKEAV, thus further compromising system security. FAKEAV typically displays fake
victims of a typical FAKEAV attack. By using scareware tactics to trick users into providing their credit card information, which cybercriminals could use to their advantage. What is the driving force for
respective security vendors. Pushing additional malware: Infected systems are more prone to other malware infections (e.g., FAKEAV infection). How do cybercriminals profit from spreading DNS changer Trojans?
ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003.) NOTES: This is a component of a FAKEAV malware.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This malware displays a legitimate-looking graphical user interface and fake infection alerts on the affected system. Should the user choose to purchase the fake application, his confidential data
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan displays fake alerts upon installation. It displays fake scanning results about disk errors. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It installs a fake
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It employs registry shell spawning by adding certain registry entries. This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.