Keyword: usoj_fraudlo.lo
301 Total Search   |   Showing Results : 1 - 20
   Next  
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
http://sjc1-te-cmsap1.sdi.trendnet.org/dumpImages/318201093043.jpeg How do users get this Web threat? This threat arrives as an attachment to certain spam messages. TrendLabs has received different
This Trojan uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan may be dropped by other malware. It adds registry entries to enable its automatic execution at every system startup. Arrival Details This Trojan may be dropped by other malware.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It displays fake
Other Details This Trojan does the following: It connects to malicious sites to download fraud applications onto the affected system. As a result, malicious routines of downloaded files are exhibited
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be unknowingly
This Trojan arrives as attachment to mass-mailed email messages. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
This Trojan deletes itself after execution. Installation This Trojan drops the following copies of itself into the affected system: C:\Documents and Settings\All Users\Application Data\{random folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It displays fake
This Trojan adds certain registry entries to disable the Task Manager. This action prevents users from terminating the malware process, which can usually be done via the Task Manager. It displays
Installation This Trojan drops the following files: %System Root%\RECYCLER\{random GUID}\Desktop.ini (Note: %System Root% is the root folder, which is usually C:\. It is also where the operating
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This