Skip to main content
Published Apr 13, 2010 | Updated Sep 15, 2017

TrojanDropper:Win32/Oficla.J

Detected by Microsoft Defender Antivirus

Aliases: Win-Trojan/Bredolab.52224.C (AhnLab) W32/Trojan3.BRZ (Command) TR/Spy.ZBot.nbv (AVG) Win32/Bredolab.AAR (CA) Trojan.MulDrop.1.10900 (Dr.Web) Win32/Oficla.FO (ESET) Trojan.Win32.Bredolab (Ikarus) W32/Bredolab.TM (Norman) Trj/Agent.NNC (Panda) Trojan.Win32.FakeMS.ws (Rising AV) Troj/Agent-MVS (Sophos) Trojan.Sasfis (Symantec) WORM_BREDOLAB.CA (Trend Micro)

Summary

TrojanDropper:Win32/Oficla.J is a detection for a trojan that installs and executes Trojan:Win32/Oficla.M, a trojan that attempts to inject code into a running process to download a rogue security program identified as TrojanDownloader:Win32/FakeScanti.
Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as Microsoft Security Essentials, or the Microsoft Safety Scanner. For more information about using antivirus software, see http://www.microsoft.com/security/antivirus/av.aspx.
Follow us