Home Malware Programs Backdoors Afcore.gen!G


Posted: December 20, 2010

Threat Metric

Ranking: 8,876
Threat Level: 8/10
Infected PCs: 173
First Seen: December 20, 2010
Last Seen: November 11, 2021
OS(es) Affected: Windows


Suspicious file [Panda]Worm.Win32.Rokut [Ikarus]Sus/BancDl-A [Sophos]TR/Spy.Banker.Gen [AntiVir]Trojan.DownLoader.origin [DrWeb]Gen:Trojan.Heur.DP.VGW@auowZtmG [BitDefender]Win32:Rootkit-gen [Avast]Trj/Hmir.F [Panda]Downloader.Generic10.RBV [AVG]Trojan-Downloader.Win32.Genome [Ikarus]Trojan-Spy.Win32.Zbot.gen (v) [Sunbelt]Downloader/Win32.Genome [AhnLab-V3]Trojan/Win32.Genome.gen [Antiy-AVL]TR/Crypt.ZPACK.Gen [AntiVir]Trojan.MulDrop1.45234 [DrWeb]
More aliases (55)

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Afcore.gen!G may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria .

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:

%APPDATA%\advantage\AdVantage.exe File name: AdVantage.exe
Size: 181.76 KB (181760 bytes)
MD5: 9642b29cd78f9d6629436997047593d9
Detection count: 44
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\advantage\
Group: Malware file
Last Updated: December 21, 2010
C:\drivers\ie8.exe File name: ie8.exe
Size: 778.75 KB (778752 bytes)
MD5: 8b2a19b18cd570f99f56608e4835caac
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: C:\drivers\
Group: Malware file
Last Updated: December 23, 2010
%PUBLIC%\HEX-5823-6893-6818\jutched.exe File name: jutched.exe
Size: 40.96 KB (40960 bytes)
MD5: a7d6a45c2f21c2051e5902bb7563cab3
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %PUBLIC%\HEX-5823-6893-6818\
Group: Malware file
Last Updated: December 22, 2010

More files

Registry Modifications

The following newly produced Registry Values are:

Regexp file mask%PUBLIC%\GUP.exe%PUBLIC%\libcurl.dll%PUBLIC%\sodom.txt