Trojan.Win32.Jorik.Fraud.un
Trojan.Win32.Jorik.Fraud.un is a mischievous Trojan infection which propagates via security program exploits or existing network vulnerabilities. Trojan.Win32.Jorik.Fraud.un generates its startup registry entry so that it could run every time you Windows is started. Trojan.Win32.Jorik.Fraud.un runs in the background and reduces your PC performance by consuming a large amount of system resources. Trojan.Win32.Jorik.Fraud.un allows attackers obtain remote access to the compromised PC system. Trojan.Win32.Jorik.Fraud.un can gather and forward confidential data to remote attackers for illegitimate purposes. Delete Trojan.Win32.Jorik.Fraud.un immediately upon detection to secure your machine.
File System Details
Trojan.Win32.Jorik.Fraud.un may create the following file(s):
# | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|
1. | %CommonAppData%\XPosROXaNo.exe | |
2. | [file and pathname of the sample #1] |
Registry Details
Trojan.Win32.Jorik.Fraud.un may create the following registry entry or registry entries:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system] DisableTaskMgr = 0x00000001
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System] DisableTaskMgr = 0x00000001
[HKEY_CURRENT_USER\Software] 75fa38b7-8b94-4995-ad32-52e938867954 = ""
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] XPosROXaNo = "%CommonAppData%\XPosROXaNo.exe"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations] LowRiskFileTypes = "/{hq:/s`s:/ogn:/uyu:/dyd:/c`u:/bnl:/ble:/sdf:/lrh:/iul:/iulm:/fhg:/clq:/kqf:/`wh:/lqf:/lqdf:/lnw:/lq2:/l2t:/v`w:/rbs:"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download] CheckExeSignatures =
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments] SaveZoneInformation = 0x00000001
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.