Search
Keyword: usoj_fakeav.smdj
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is the Trend Micro detection for shortcut files (.LNK) used as a component by FAKEAV malware family. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan is noteworthy as it tricks the user into purchasing the rogue product from a certain website asking for sensitive information, such as credit card numbers. To get a one-glance
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This malware installs itself on the infected system as a rogue antivirus application using certain names that include the affected system's Operating System (OS). Should the user choose to purchase
This Trojan does not have rootkit capabilities. It does not exploit any vulnerability. This Trojan moves specific files in the certain directories. This Trojan arrives on a system as a file dropped
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It poses as an antispyware application that uses pop-up
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
Installation This Trojan drops the following files: %System Root%\Documents and Settings\All Users\Application Data\{random}\{random} - encypted component %User Desktop%\Smart Fortress 2012.lnk -
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan displays fake alerts upon installation. It displays fake scanning results about disk errors. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It executes then deletes itself
capable of detecting and cleaning a variety of FAKEAV malware family. PROACTIVE_FAKEAV is only triggered by manual scan. To enable PROACTIVE_FAKEAV, the following neccessary components are required: DCE
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be dropped by other malware. It does not have any propagation routine. It does not have any backdoor routine. When users agree to buy the software, it connects to a certain URL. It
{All User's Profile}\Application Data\pcdfdata\vl.bin - encrypted FAKEAV file. The decrypted file is detected as TROJ_FAKEAV.BUTH %ProgramData%\pcdfdata\vl.bin (Windows Vista and 7 only) - encrypted