Home Malware Programs Viruses Obfuscator.HG

Obfuscator.HG

Posted: December 7, 2010

Threat Metric

Threat Level: 8/10
Infected PCs: 105
First Seen: December 7, 2010
OS(es) Affected: Windows

Aliases

Virus.Win32.Delf.CSK [Ikarus]VirTool.Win32.Obfuscator.ah!a (v) [Sunbelt]Suspicious.Cloud [Symantec]Mal/EncPk-HJ [Sophos]Virus.Win32.Delf.CSK!IK [a-squared]a variant of Win32/Kryptik.FCM [NOD32](Suspicious) - DNAScan [CAT-QuickHeal]a variant of Win32/Kryptik.FQU [NOD32]Artemis!172548121698 [McAfee]Pakes.GPM [AVG]Generic Trojan [Panda]W32/Agent.EZMS!tr [Fortinet]Trojan.Win32.Kryptik.agfl (v) [Sunbelt]Trojan/Win32.Agent [AhnLab-V3]Trojan/Win32.Agent.gen [Antiy-AVL]
More aliases (79)

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Obfuscator.HG may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria .

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%TEMP%\ope85.exe File name: ope85.exe
Size: 509.44 KB (509440 bytes)
MD5: 1725481216988e919cf47b27da57b720
Detection count: 91
Mime Type: unknown/exe
Path: %TEMP%\
Group: Malware file
Last Updated: December 8, 2010
%TEMP%\ope87.exe File name: ope87.exe
Size: 503.8 KB (503808 bytes)
MD5: 4c7edbc3cf59718f800d519eb2e2cf51
Detection count: 77
Mime Type: unknown/exe
Path: %TEMP%\
Group: Malware file
Last Updated: December 7, 2010
%TEMP%\opeD66A.exe File name: opeD66A.exe
Size: 280.57 KB (280576 bytes)
MD5: 69c71aa877a61c174609aa319a5c3860
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%\
Group: Malware file
Last Updated: December 7, 2010
%TEMP%\ope2E.exe File name: ope2E.exe
Size: 498.68 KB (498688 bytes)
MD5: 44de5cd09996aa97bce93a812135a890
Detection count: 14
Mime Type: unknown/exe
Path: %TEMP%\
Group: Malware file
Last Updated: December 7, 2010
%TEMP%\fFollower.exe File name: fFollower.exe
Size: 261.12 KB (261120 bytes)
MD5: 41a5cd1f8ca4f57c1e3910176ffbed8a
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%\
Group: Malware file
Last Updated: December 7, 2010

More files