Trojan:MSIL/Vbato.A
Posted: January 18, 2011
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Threat Level: | 8/10 |
|---|---|
| Infected PCs: | 126 |
| First Seen: | January 18, 2011 |
|---|---|
| Last Seen: | January 31, 2022 |
| OS(es) Affected: | Windows |
Trojan:MSIL/Vbato.A, sometimes considered a variant from the Vundo family, is a dropper Trojan that installs other types of malicious software onto your PC, most prominently spyware and scamware products. Since SpywareRemove.com malware researchers have found that many variants of Trojan:MSIL/Vbato.A are capable of injecting their code into normal system processes, you may not be able to notice individual files or processes of a Trojan:MSIL/Vbato.A infection. The symptoms that a Trojan:MSIL/Vbato.A infection exhibits can also vary and may not be significantly visible, which is why you should use a suitable anti-malware product to find and delete Trojan:MSIL/Vbato.A before serious harm is done.
The Numerous Forms and Faces of Trojan:MSIL/Vbato.A
Trojan:MSIL/Vbato.A was first defined as a PC threat in August of 2010, but Trojan:MSIL/Vbato.A infections are still criculating and are capable of being a danger to any Windows PC. Unlike more well-defined Trojans such as Zlob or Fake Microsoft Security Essentials Alert, Trojan:MSIL/Vbato.A is identified by a multitude of different labels depending on which brand of software detects the infection. The following names are all popular aliases for Trojan:MSIL/Vbato.A:
- Trojan-Dropper.Win32.Vundo
- Trojan/Win32.CSon
- Win32/ASuspect.HHKHD
- Trojan.PWS.Panda.171
- Win32:Inject-ZP
- Trojan-Spy.MSIL.Agent.bza
- PSW.Generic8.LHQ
Other minor variations can also be seen, but the majority of AV brands will list Trojan:MSIL/Vbato.A as some subtype of Trojan-Spy.MSIL.Agent.bza. As many of its aliases imply, Trojan:MSIL/Vbato.A is noted for its tendency to install spyware. Spyware may take a variety of forms, but common forms of spyware-based attacks include keylogging (recording keyboard input to a log file), capturing screenshots and stealing passwords and other login-related information.
Keyloggers and other forms of spyware that Trojan:MSIL/Vbato.A may install must access the Internet, to send their stolen information to criminal entities; because of this, a common secondary symptom of spyware infections is unusually altered network settings. As long as Trojan:MSIL/Vbato.A and related infections are on your PC, you should be aware of the possibility of open network ports or program exceptions that are added to your firewall without your consent.
Related Threats That Trojan:MSIL/Vbato.A May Utilize Against Your Computer
SpywareRemove.com malware researchers have found that the majority of dropper Trojans, including Trojan:MSIL/Vbato.A, are configurable and can install many different types of malicious programs. In addition to spyware-related perils, a Trojan:MSIL/Vbato.A infection may also subject you to fake security programs (or rogue security applications) that create false positive alerts, browser hijackers that change the websites that your browser displays, rootkits that infect normal Windows processes or other Trojans, such as VirtuMonde.prx.
If you believe that Trojan:MSIL/Vbato.A is on your computer, you should assume that Trojan:MSIL/Vbato.A is active, until you've used Safe Mode or another secure boot option to verify that Trojan:MSIL/Vbato.A hasn't launched. Deleting Trojan:MSIL/Vbato.A, even with advanced security or anti-virus software, may be impossible, if you don't stop Trojan:MSIL/Vbato.A from launching beforehand. Manually removing Trojan:MSIL/Vbato.A isn't suggested, in most situations, due to the high probability of other infections existing on your computer, as well as the probability of Windows Registry changes.
Aliases
More aliases (149)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%WINDIR%\hi\Qvod9141.81.dll
File name: Qvod9141.81.dllSize: 28.67 KB (28672 bytes)
MD5: 59b1645936ebce4c01c9a6a92d2b6d1d
Detection count: 93
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\hi
Group: Malware file
Last Updated: January 24, 2011
%WINDIR%\system32\vokhjjfskclkmniq.dll
File name: vokhjjfskclkmniq.dllSize: 416.76 KB (416768 bytes)
MD5: f19ad361b23beefacb75e64c364010f4
Detection count: 80
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\system32
Group: Malware file
Last Updated: January 19, 2011
%USERPROFILE%\Start Menu\Programs\Startup\crscss.exe
File name: crscss.exeSize: 837.12 KB (837120 bytes)
MD5: 8f5ef18df72496a4843dbc075dcd4d97
Detection count: 75
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Start Menu\Programs\Startup
Group: Malware file
Last Updated: January 19, 2011
%APPDATA%\audiohd.exe
File name: audiohd.exeSize: 43.52 KB (43520 bytes)
MD5: 2587ae9f04bfd9e795f33b10159378fa
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: January 24, 2011
%WINDIR%\system32\gebywu.dll
File name: gebywu.dllSize: 97.79 KB (97792 bytes)
MD5: dc858e5f2c243a170963604936d84eee
Detection count: 26
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\system32
Group: Malware file
Last Updated: February 7, 2011
C:\Program Files (x86)\Audio CD Burner Studio\audio_cd_burner.exe
File name: audio_cd_burner.exeSize: 1.54 MB (1547820 bytes)
MD5: e60cea4862499abce10e7441223bf045
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: C:\Program Files (x86)\Audio CD Burner Studio\audio_cd_burner.exe
Group: Malware file
Last Updated: November 11, 2021
%COMMONPROGRAMFILES%\BOONTY Shared\Service\Boonty.exe
File name: Boonty.exeSize: 69.12 KB (69120 bytes)
MD5: c92977c1551b1662a2e5b5275c5195ce
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %COMMONPROGRAMFILES%\BOONTY Shared\Service
Group: Malware file
Last Updated: January 19, 2011
%TEMP%\pmnmkl.dll
File name: pmnmkl.dllSize: 101.88 KB (101888 bytes)
MD5: 3be90f946cd1dff3c0ae605eff588d82
Detection count: 7
File type: Dynamic link library
Mime Type: unknown/dll
Path: %TEMP%
Group: Malware file
Last Updated: February 2, 2011
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.