UDS:DangerousObject.Multi.Generic

UDS:DangerousObject.Multi.Generic Description

UDS:DangerousObject.Multi.Generic is a malware infection, which is often detected simultaneously in multiple locations on an infected computer system. The most often reported location UDS:DangerousObject.Multi.Generic sets itself is Documents and Settings, usually as a part of C drive. UDS:DangerousObject.Multi.Generic is difficult to detect and remove from the corrupted PC by many security tools. The detection of UDS:DangerousObject.Multi.Generic is only available for adding to exclusions, ignoring, browsing to location including it, or threat description could be produced. PC users are either taken to the empty folder or cannot access the object.

Aliases


JS.Downloader.BSO [Ikarus]VBS/Dldr.Rowm.AVBS.Siggen.7444 [DrWeb]UnclassifiedMalware [Comodo]Script.Trojan.Suspic.PdclTrojan.Script.Siggen.degaljTrojan.Script.Suspic.gen [Kaspersky]Script.Trojan.Agent.FZPT9I [GData]Win.Worm.Agent-4608 [ClamAV]JS:Downloader-BSP [Trj] [Avast]VBS/Agent.NCOVBS.Downloader.Trojan [Symantec]Trojan.MSIL.Agent.QOJMSIL/Agent.QOJ!tr [Fortinet]Trojan/Win32.Agent [AhnLab-V3]
More aliases (46)

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to UDS:DangerousObject.Multi.Generic may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\Users\admin\AppData\Local\Temp\bt2xe2pxlqt\001.exe File name: 001.exe
Size: 5.62 MB (5627904 bytes)
MD5: 68cdf51e0ae79ed4e865ea170915c1f9
Detection count: 3,832
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\admin\AppData\Local\Temp\bt2xe2pxlqt\
Group: Malware file
Last Updated: January 28, 2020
%SYSTEMDRIVE%\users\server\appdata\roaming\dmcache\w32tm.exe\w32tm.exe File name: w32tm.exe
Size: 335.2 KB (335204 bytes)
MD5: 1c3aacaf13655959038a0ad93c2285bd
Detection count: 3,619
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\users\server\appdata\roaming\dmcache\w32tm.exe\
Group: Malware file
Last Updated: January 13, 2020
%SYSTEMDRIVE%\Users\sonhh\AppData\Roaming\dzdwxaFiy.exe\dzdwxaFiy.exe File name: dzdwxaFiy.exe
Size: 518.37 KB (518375 bytes)
MD5: b640cbcda403e6d4ddeec62c163785bc
Detection count: 2,180
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\sonhh\AppData\Roaming\dzdwxaFiy.exe\
Group: Malware file
Last Updated: December 19, 2019
%SYSTEMDRIVE%\Users\kubaj\AppData\Roaming\Launcher_091.exe\Launcher_091.exe File name: Launcher_091.exe
Size: 3.67 MB (3673088 bytes)
MD5: ea928e5200c6f424afd977661a79f308
Detection count: 1,618
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\kubaj\AppData\Roaming\Launcher_091.exe\
Group: Malware file
Last Updated: January 28, 2020
%SYSTEMDRIVE%\Users\INVESTA NIAGA ABADI\AppData\Local\Temp\BB56.tmp.exe\BB56.tmp.exe File name: BB56.tmp.exe
Size: 435.2 KB (435200 bytes)
MD5: d4ab761ceeb9855cca7b096ae1b9928e
Detection count: 1,445
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Users\INVESTA NIAGA ABADI\AppData\Local\Temp\BB56.tmp.exe\
Group: Malware file
Last Updated: January 7, 2020
%PROGRAMFILES(x86)%\eLicenser\POS\SYNS0POS.exe\SYNS0POS.exe File name: SYNS0POS.exe
Size: 566.78 KB (566784 bytes)
MD5: 011c943da18f79266faf738691539460
Detection count: 623
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\eLicenser\POS\SYNS0POS.exe\
Group: Malware file
Last Updated: January 28, 2020
071bb8302bffef38a38a267d434f71ab File name: 071bb8302bffef38a38a267d434f71ab
Size: 327.16 KB (327168 bytes)
MD5: 071bb8302bffef38a38a267d434f71ab
Detection count: 436
Group: Malware file
Last Updated: January 28, 2020
C:\ProgramData\rhba\kcxa.exe File name: kcxa.exe
Size: 446.46 KB (446464 bytes)
MD5: 1d96698d9b8f1f963e24f636b880c2b7
Detection count: 276
File type: Executable File
Mime Type: unknown/exe
Path: C:\ProgramData\rhba\
Group: Malware file
Last Updated: January 11, 2020
C:\Users\MASTANG\AppData\Local\Temp\ba43bwuk0qx\marg.exe File name: marg.exe
Size: 1.96 MB (1962496 bytes)
MD5: 4487f259c461281c1153037b7b8e9251
Detection count: 276
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\MASTANG\AppData\Local\Temp\ba43bwuk0qx\
Group: Malware file
Last Updated: January 28, 2020
C:\ProgramData\nmljih\stqwj.exe File name: stqwj.exe
Size: 222.2 KB (222208 bytes)
MD5: 5cacf2b43b8d5578156df066f2181117
Detection count: 166
File type: Executable File
Mime Type: unknown/exe
Path: C:\ProgramData\nmljih\
Group: Malware file
Last Updated: January 14, 2020
%ALLUSERSPROFILE%\Catalogs\mprext.exe\mprext.exe File name: mprext.exe
Size: 1.98 MB (1983488 bytes)
MD5: bfadf0489b5962defcbd93d4399980d0
Detection count: 164
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Catalogs\mprext.exe\
Group: Malware file
Last Updated: November 11, 2019
c:\users\duyennguyen\downloads\alienskinexposure5.5.0downloa\open setup file\setup\setup.exe File name: setup.exe
Size: 4.49 MB (4497373 bytes)
MD5: 2239fcbdac9582e1a379dc39ca1e4dd1
Detection count: 126
File type: Executable File
Mime Type: unknown/exe
Path: c:\users\duyennguyen\downloads\alienskinexposure5.5.0downloa\open setup file\setup\
Group: Malware file
Last Updated: January 28, 2020
C:\Users\PC\AppData\Roaming\UpdateService\UpdateCheck.exe File name: UpdateCheck.exe
Size: 10.24 KB (10240 bytes)
MD5: 277702c7478125442d2275a1b6b97294
Detection count: 96
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\PC\AppData\Roaming\UpdateService\
Group: Malware file
Last Updated: January 17, 2020
C:\Users\PC\AppData\Roaming\UpdateService\UpdateService.exe File name: UpdateService.exe
Size: 13.31 KB (13312 bytes)
MD5: c241388c3341fcb6c92d2e276c75d3b2
Detection count: 80
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\PC\AppData\Roaming\UpdateService\
Group: Malware file
Last Updated: January 17, 2020
8f360227e7ee415ff509c2e443370e56 File name: 8f360227e7ee415ff509c2e443370e56
Size: 789.34 KB (789349 bytes)
MD5: 8f360227e7ee415ff509c2e443370e56
Detection count: 46
Group: Malware file
C:\Users\PC\AppData\Roaming\ProxyService\ProxyService.exe File name: ProxyService.exe
Size: 4.2 MB (4209152 bytes)
MD5: e73352779c3a1eb0fb15e087d48c94f1
Detection count: 42
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\PC\AppData\Roaming\ProxyService\
Group: Malware file
Last Updated: December 16, 2019
c:\users\sistemas com\appdata\roaming\360safe\snapshot\dplaysvr.exe File name: dplaysvr.exe
Size: 1.2 MB (1200984 bytes)
MD5: 872f294a5739e722c92005736f7bbfcd
Detection count: 37
File type: Executable File
Mime Type: unknown/exe
Path: c:\users\sistemas com\appdata\roaming\360safe\snapshot\
Group: Malware file
Last Updated: January 27, 2020
%SYSTEMDRIVE%\users\user\desktop\crack.exe File name: crack.exe
Size: 4.38 MB (4380974 bytes)
MD5: 6f2f7f2ce0ef33d170cf9ee67265770d
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\users\user\desktop\
Group: Malware file
Last Updated: January 27, 2020
3a3bad366916aa3198fd1f76f3c29f24 File name: 3a3bad366916aa3198fd1f76f3c29f24
Size: 501.1 KB (501101 bytes)
MD5: 3a3bad366916aa3198fd1f76f3c29f24
Detection count: 30
Group: Malware file
%PROGRAMFILES%\inno\4556.exe File name: 4556.exe
Size: 2.17 MB (2170880 bytes)
MD5: b6cb645f41d9597d1c76422b9eb68ac2
Detection count: 26
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\inno\
Group: Malware file
Last Updated: January 27, 2020
852c0299c8b17235551b5ea2c82e648b File name: 852c0299c8b17235551b5ea2c82e648b
Size: 4.34 MB (4341581 bytes)
MD5: 852c0299c8b17235551b5ea2c82e648b
Detection count: 14
Group: Malware file
c:\users\es\appdata\roaming\apple computer\logs\crashreporter\mobiledevice\syskey.exe File name: syskey.exe
Size: 273.7 KB (273701 bytes)
MD5: 8b197942a55ea3e933ab0d3ab120da95
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: c:\users\es\appdata\roaming\apple computer\logs\crashreporter\mobiledevice\
Group: Malware file
Last Updated: January 23, 2020
c:\users\test\appdata\local\temp\4261018493 - copy.exe File name: 4261018493 - copy.exe
Size: 697.85 KB (697856 bytes)
MD5: 6b73b162a774ebf9077588c2a7c08448
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: c:\users\test\appdata\local\temp\
Group: Malware file
Last Updated: September 19, 2019
%SYSTEMDRIVE%\users\evgonplay\desktop\extrimhack_free_11.01.2020_.exe File name: extrimhack_free_11.01.2020_.exe
Size: 11.25 MB (11257856 bytes)
MD5: 9bd77808fb25e43974e4c7a49c566472
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\users\evgonplay\desktop\
Group: Malware file
Last Updated: January 21, 2020

More files

Registry Modifications


The following newly produced Registry Values are:

Directory%allusersprofile%\application data\cbnjsc%ALLUSERSPROFILE%\Application Data\Chrome 67%ALLUSERSPROFILE%\Application Data\flashplayer%ALLUSERSPROFILE%\Application Data\iTranslator%ALLUSERSPROFILE%\Application Data\Microsoft\ChromeHost%ALLUSERSPROFILE%\Application Data\migvctgvwf%ALLUSERSPROFILE%\Application Data\padur%ALLUSERSPROFILE%\Application Data\Process%ALLUSERSPROFILE%\Application Data\subfolder%ALLUSERSPROFILE%\Application Data\Time Manager%ALLUSERSPROFILE%\Application Data\win%ALLUSERSPROFILE%\Application Data\xgrruglcri%ALLUSERSPROFILE%\cbnjsc%ALLUSERSPROFILE%\Chrome 67%ALLUSERSPROFILE%\chromebrowser%ALLUSERSPROFILE%\CreativeAudio%ALLUSERSPROFILE%\dellhd%ALLUSERSPROFILE%\flashplayer%ALLUSERSPROFILE%\gpuoptimizer%ALLUSERSPROFILE%\ig stories downloader%ALLUSERSPROFILE%\iTranslator%ALLUSERSPROFILE%\javaupdate%ALLUSERSPROFILE%\Microsoft\ChromeHost%ALLUSERSPROFILE%\migvctgvwf%ALLUSERSPROFILE%\padur%ALLUSERSPROFILE%\Process%ALLUSERSPROFILE%\softwaredata%ALLUSERSPROFILE%\subfolder%ALLUSERSPROFILE%\SystemNetwork%ALLUSERSPROFILE%\Time Manager%ALLUSERSPROFILE%\xgrruglcri%ALLUSERSPROFILE%\ybetnetrosh%APPDATA%\adobe\x64v8%APPDATA%\adobe\x86v8%APPDATA%\AdobeUpdater%APPDATA%\amd64_dual%APPDATA%\amd64_microsoft-windows-com-complus-admin%APPDATA%\amd64_microsoft-windows-mspaint.resources%appdata%\amd64_microsoft-windows-p..tionsnonwinpeplugin%APPDATA%\amd64_microsoft-windows-printing-wsdahost%APPDATA%\amd64_microsoft-windows-unimodem-core%appdata%\amd64_microsoft-windows-wia-automation%appdata%\amd64_net1yx64.inf%APPDATA%\amd64_netfx4-system.compo..sition.registration%APPDATA%\amd64_networking-mpssvc-admin%appdata%\amd64_presentationcore%appdata%\AppVPolicy%APPDATA%\AudioDG%APPDATA%\device association helper%APPDATA%\DRPNano%APPDATA%\Estrella%APPDATA%\ethr32%APPDATA%\hnext%APPDATA%\HttpFilter%APPDATA%\Intel Rapid%APPDATA%\javaupdate%APPDATA%\JavaUpdaterV118%APPDATA%\kuru%APPDATA%\lucidswapper%APPDATA%\Microsoft\Windows\Start Menu\Programs\WallpaperBoard%appdata%\msdcsc%appdata%\MSOCache%APPDATA%\NewApp%APPDATA%\NisS%APPDATA%\NVIDIADriver%APPDATA%\Path%APPDATA%\PresentationHost%APPDATA%\PrivacyTools%APPDATA%\qfabgqva%appdata%\RailSoft%APPDATA%\RAVBg64%APPDATA%\realtek sound blaster%APPDATA%\renard%APPDATA%\runtimeservice%APPDATA%\Security Updater%APPDATA%\SunJavaUpdate%APPDATA%\Sys_Processes%APPDATA%\SysDriver%APPDATA%\TempFolderPath%APPDATA%\terminal%appdata%\tspro manager%APPDATA%\TSTheme%APPDATA%\UBlockPlugin%APPDATA%\vip72 (x86)%APPDATA%\WinBootSystem%APPDATA%\wisinternal%appdata%\wow64_microsoft-windows-crypttpmeksvc-dll%APPDATA%\wow64_microsoft-windows-d..nt-winproviders-ibs%APPDATA%\x86_microsoft-windows-a..bility-assistant-db%APPDATA%\x86_microsoft-windows-crtdll%APPDATA%\x86_microsoft-windows-w..ement-adm.resources%APPDATA%\yjfzjgnn%APPDATA%\Yl9dVUAx%APPDATA%\zupdater%HOMEDRIVE%\Cache\All Users\{90120000-0019-0816-0000-0000000FF1CE}-C%HOMEDRIVE%\DocumentssandsSettings%HOMEDRIVE%\fsurlpmo%HOMEDRIVE%\nvidiareatek%HOMEDRIVE%\Systemsolumsnformation%HOMEDRIVE%\win%LOCALAPPDATA%\_foldernamelocalappdata_%LOCALAPPDATA%\adddeskmodule%LOCALAPPDATA%\AdobeUpdater%LOCALAPPDATA%\browserupdphenix%LOCALAPPDATA%\hili%localappdata%\icloudpi%LOCALAPPDATA%\ILBridge%LOCALAPPDATA%\intelmx%LOCALAPPDATA%\NtvHost%LOCALAPPDATA%\Path%LOCALAPPDATA%\SysDriver%LOCALAPPDATA%\wallpaperboard%LOCALAPPDATA%\windowsw0w32%localappdata%\WinNetCore%PROGRAMFILES%\Brek%PROGRAMFILES%\Charkoucha%PROGRAMFILES%\Cyper%PROGRAMFILES%\Dod%PROGRAMFILES%\dodw%PROGRAMFILES%\doleres%PROGRAMFILES%\doles%PROGRAMFILES%\DreamTrips%PROGRAMFILES%\Fetmich%PROGRAMFILES%\fyunzip%PROGRAMFILES%\Gazouza%PROGRAMFILES%\hps%PROGRAMFILES%\kattous%PROGRAMFILES%\Kituv\read%PROGRAMFILES%\MLeemHqgAGUn%PROGRAMFILES%\opura%PROGRAMFILES%\ouxonpaar%PROGRAMFILES%\rabbit66%PROGRAMFILES%\scurity%PROGRAMFILES%\sdvsdv%PROGRAMFILES%\Seed Trade%PROGRAMFILES%\systimizer%PROGRAMFILES%\tspro manager%PROGRAMFILES%\US Media Capital%PROGRAMFILES%\WW%PROGRAMFILES%\xinsuzip%PROGRAMFILES(x86)%\Brek%PROGRAMFILES(x86)%\busa%PROGRAMFILES(x86)%\Charkoucha%PROGRAMFILES(x86)%\Cyper%PROGRAMFILES(x86)%\Dod%PROGRAMFILES(x86)%\dodw%PROGRAMFILES(x86)%\doleres%PROGRAMFILES(x86)%\doles%PROGRAMFILES(x86)%\DreamTrips%PROGRAMFILES(x86)%\Fetmich%PROGRAMFILES(x86)%\fyunzip%PROGRAMFILES(x86)%\Gazouza%PROGRAMFILES(x86)%\hps%PROGRAMFILES(x86)%\kattous%PROGRAMFILES(x86)%\Kituv\read%PROGRAMFILES(x86)%\MLeemHqgAGUn%PROGRAMFILES(x86)%\opura%PROGRAMFILES(x86)%\ouxonpaar%PROGRAMFILES(x86)%\rabbit66%PROGRAMFILES(x86)%\scurity%PROGRAMFILES(x86)%\sdvsdv%PROGRAMFILES(x86)%\Seed Trade%PROGRAMFILES(x86)%\systimizer%PROGRAMFILES(x86)%\tspro manager%PROGRAMFILES(x86)%\US Media Capital%PROGRAMFILES(x86)%\WW%PROGRAMFILES(x86)%\xinsuzip%TEM%\subx%TEMP%\appventvirtualization%Temp%\lstemp%TEMP%\sdfr%TEMP%\Skyp%UserProfile%\AppData\LocalLow\LIdrscGAPoBhw%UserProfile%\AppData\LocalLow\xHLLMjruyIoAv%USERPROFILE%\Documents\SystemServices Inc%UserProfile%\Local Settings\Application Data\_foldernamelocalappdata_%UserProfile%\Local Settings\Application Data\adddeskmodule%UserProfile%\Local Settings\Application Data\browserupdphenix%UserProfile%\Local Settings\Application Data\ILBridge%UserProfile%\Local Settings\Application Data\NtvHost%UserProfile%\Local Settings\Application Data\SysDriver%USERPROFILE%\LockScreenContentServer%USERPROFILE%\sadsg%USERPROFILE%\scksk%USERPROFILE%\subfolder%USERPROFILE%\UpdateNotificationMgr%WINDIR%\iTranslator%WINDIR%\temp\a75399f6-f026-4fb5-ada3-68d832bcffd3-sigs%WINDIR%\Temp\FA5399F6-F026-4FGF-ADA3-68DD97%WINDIR%\trustedlogosRegexp file mask%ALLUSERSPROFILE%\[RANDOM CHARACTERS].scr%ALLUSERSPROFILE%\a9d3772275\hkmoov.exe%ALLUSERSPROFILE%\adobe.js%ALLUSERSPROFILE%\Adobe\system32\process.exe%ALLUSERSPROFILE%\analporn.dll%ALLUSERSPROFILE%\Application Data\[RANDOM CHARACTERS].scr%ALLUSERSPROFILE%\Application Data\a9d3772275\hkmoov.exe%ALLUSERSPROFILE%\Application Data\adobe.js%ALLUSERSPROFILE%\Application Data\Adobe\System32\process.exe%ALLUSERSPROFILE%\Application Data\analporn.dll%ALLUSERSPROFILE%\Application Data\apps\svvhosts.exe%ALLUSERSPROFILE%\Application Data\cf4620d67a\hkmoov.exe%ALLUSERSPROFILE%\Application Data\eanavigator\eanavigator.exe%ALLUSERSPROFILE%\Application Data\ms.exe%ALLUSERSPROFILE%\Application Data\plainupdate.exe%ALLUSERSPROFILE%\Application Data\RealtekHD\taskhost[RANDOM CHARACTERS].exe%ALLUSERSPROFILE%\Application Data\search.exe%ALLUSERSPROFILE%\Application Data\SoftwareData\sihost.exe%ALLUSERSPROFILE%\Application Data\systemidle.exe%allusersprofile%\application data\temp[RANDOM CHARACTERS].exe%ALLUSERSPROFILE%\Application Data\updates\updl.dll%allusersprofile%\application data\windows.bat%ALLUSERSPROFILE%\apps\svvhosts.exe%ALLUSERSPROFILE%\cf4620d67a\hkmoov.exe%ALLUSERSPROFILE%\eanavigator\eanavigator.exe%allusersprofile%\images.exe%ALLUSERSPROFILE%\load32.exe%ALLUSERSPROFILE%\ms.exe%ALLUSERSPROFILE%\plainupdate.exe%allusersprofile%\putty.exe%ALLUSERSPROFILE%\RealtekHD\taskhost[RANDOM CHARACTERS].exe%ALLUSERSPROFILE%\reducenv.exe%ALLUSERSPROFILE%\reductor.exe%ALLUSERSPROFILE%\search.exe%ALLUSERSPROFILE%\systemidle.exe%allusersprofile%\temp[RANDOM CHARACTERS].exe%ALLUSERSPROFILE%\updates\updl.dll%allusersprofile%\windows.bat%APPADATA%\acrotray.exe%appdata%\3425erf.exe%APPDATA%\[RANDOM CHARACTERS]%APPDATA%\[RANDOM CHARACTERS].scr%APPDATA%\[RANDOM CHARACTERS].vbs%APPDATA%\[RANDOM CHARACTERS]srss.exe%APPDATA%\Adobe Acrobat Services\Adobe Acrobat Services.exe%APPDATA%\AdobeAR.exe%APPDATA%\Autorunner.exe%appdata%\autostarter.exe%APPDATA%\Casocika.exe%APPDATA%\cbvbfxcb.exe%APPDATA%\CDRom.dll%APPDATA%\Certificates\sibmfxsv.exe%APPDATA%\Certificates\sishost.exe%APPDATA%\chrome_update.exe%appdata%\chromium caster.exe%APPDATA%\ClientHost.exe%APPDATA%\Config\windefender.exe%APPDATA%\Constatplus.exe%appdata%\cwrcdr4.exe%appdata%\cyqdglmiqs.exe%APPDATA%\d+.tmp.JS%APPDATA%\DAS.exe%APPDATA%\dgbsz.exe%APPDATA%\dynevu.exe%APPDATA%\Eset.exe%APPDATA%\fdfbvd.exe%APPDATA%\file_sock.exe%APPDATA%\fins.exe%appdata%\firefox utility.exe%APPDATA%\firfox.scr%APPDATA%\FlashPlayerVaytix.exe%appdata%\ghnnbgv.exe%appdata%\ground.exe%appdata%\gtreefcd.exe%APPDATA%\index\index.exe%APPDATA%\iplog.url%APPDATA%\Jucheckx64.exe%appdata%\juirtjcfd.exe%APPDATA%\KoDriver\mpgvec.exe%APPDATA%\learn\drop.exe%APPDATA%\lol.exe%APPDATA%\mama\un[RANDOM CHARACTERS].exe%APPDATA%\mcpu.exe%APPDATA%\Media\sys32.exe%APPDATA%\mgpu.exe%appdata%\microsoft onedrive.exe%APPDATA%\microsoft\windows\start menu\programs\images.exe%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\.vbs%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\arros.vbs%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\BOOT.exe.exe%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\CARTA-COBRO.vbs%AppData%\Microsoft\Windows\Start Menu\Programs\Startup\d+.tmp.JS%APPDATA%\microsoft\windows\start menu\programs\startup\dead.exe%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\FACTUR[RANDOM CHARACTERS].VBS%APPDATA%\microsoft\windows\start menu\programs\startup\java update.exe%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\myapp.exe%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Nvideo_driver.js%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\run.lnk%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\RuntimeBroker.exe%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\servicas.exe%appdata%\microsoft\windows\start menu\programs\startup\sistema operacional.exe%appdata%\microsoft\windows\start menu\programs\startup\system[RANDOM CHARACTERS].vbs%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\TT_Copy.exe%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\typeperf.url%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Worm.vbs%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\w{1,10}.tmp.exe%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs%APPDATA%\Microsoft\Windows\Start Menu\Startup\1apple.exe%APPDATA%\MicrosoftSec.exe%appdata%\mozillamaintenanceserviced\mozillamaintenanceserviced.exe%appdata%\msshell32%APPDATA%\MyApp\MyApp.exe%APPDATA%\neduke.exe%APPDATA%\null%APPDATA%\paint.exe%appdata%\payerss.ini%APPDATA%\PC\app.exe%APPDATA%\Pilot.exe%APPDATA%\radeonwin.exe%appdata%\rewrtrbvfd.exe%appdata%\rtbvfdcred.exe%appdata%\rtgefwd.exe%appdata%\rv4vrcf34g.exe%appdata%\ry9mumh1.exe%APPDATA%\Sarat.exe%appdata%\search.exe%APPDATA%\sgvhost.exe%APPDATA%\Skypez.exe%APPDATA%\SSJK.exe%APPDATA%\start.exe%APPDATA%\Suporte.exe%APPDATA%\svcs.exe%APPDATA%\svhost%APPDATA%\tasklist.exe.1%appdata%\tbgvrfcedxs.exe%APPDATA%\Telegram.exe%APPDATA%\terra.exe%APPDATA%\timetophoto.exe%APPDATA%\tmp546.dat%APPDATA%\TouchEnKey[RANDOM CHARACTERS].exe%APPDATA%\update\update.exe%APPDATA%\viddl.exe%appdata%\windiver.dll%APPDATA%\WindowsSearchHostFilter.exe%APPDATA%\w{3,4}.tmp.exe%appdata%\yhgtrfed.exe%APPDATA%\zae.exe%COMMONPROGRAMFILES%\notepad.exe%COMMONPROGRAMFILES%\system\srv.exe%COMMONPROGRAMFILES%\system\sysmenu64.dll%COMMONPROGRAMFILES(x86)%\notepad.exe%COMMONPROGRAMFILES(x86)%\system\srv.exe%COMMONPROGRAMFILES(x86)%\system\sysmenu64.dll%HOMEDRIVE%\$Recycle.Bin\find_me.tmp%HOMEDRIVE%\[NUMBERS].exe%HOMEDRIVE%\GOOGLE[NUMBERS].exe%HOMEDRIVE%\Intel\testing.exe%HOMEDRIVE%\RECYCLER\find_me.tmp%HOMEDRIVE%\sysupdater\sysupdater.exe%LOCALAPPDATA%\exploit-main.dll%LOCALAPPDATA%\GenericTools\DocBlue.exe%LOCALAPPDATA%\GenericTools\SiSoft.exe%LOCALAPPDATA%\GenericTools\WebSoft.exe%LOCALAPPDATA%\JaxxLiberty\ServiceHub.IdentityHost.exe%LOCALAPPDATA%\protect.exe%LOCALAPPDATA%\schost.exe%localappdata%\soloing.exe%LOCALAPPDATA%\svsc.exe%LOCALAPPDATA%\Temp/Server.exe%localappdata%\tempserver[NUMBERS].exe%LOCALAPPDATA%\vrchost.exe%localappdata%\w{1,3}.exe%PROGRAMFILES%\[NUMBERS].exe%programfiles%\bubas\setupx.exe%programfiles%\copa\dowloadx.exe%programfiles%\love\setx.exe%programfiles%\new year\setupx.exe%programfiles%\xedd\setupx.exe%PROGRAMFILES(x86)%\[NUMBERS].exe%programfiles(x86)%\bubas\setupx.exe%programfiles(x86)%\copa\dowloadx.exe%programfiles(x86)%\love\setx.exe%programfiles(x86)%\new year\setupx.exe%programfiles(x86)%\xedd\setupx.exe%PUBLIC%\[RANDOM CHARACTERS].scr%PUBLIC%\w{3,4}.exe%SYSTEMDRIVE%\launcher.bat%TEMP%\1payload.exe%temp%\[RANDOM CHARACTERS]explorer.exe%TEMP%\a[NUMBERS].exe%TEMP%\cholericly.exe%TEMP%\data7.exe%TEMP%\Disk.sys%TEMP%\dllhost.exe%TEMP%\gooogl.exe%TEMP%\MyApp\myapp.exe%TEMP%\rundll64.bat%TEMP%\SBOTshot%TEMP%\scrss.exe%TEMP%\seescenicelfe.exe%TEMP%\seescenicelfu.exe%TEMP%\subconcious\subconcious.exe%TEMP%\sysguard.exe%TEMP%\sysqem[RANDOM CHARACTERS].exe%TEMP%\troyaj.exe%TEMP%\Upd.exe%TEMP%\update.vbs%TEMP%\xelpi[RANDOM CHARACTERS].exe%TEMP%\xtex[RANDOM CHARACTERS].exe%USERPROFILE%\[RANDOM CHARACTERS].scr%USERPROFILE%\AdobeUpdate.exe%USERPROFILE%\Documents\DocumentsManager.exe%UserProfile%\Local Settings\Application Data\exploit-main.dll%UserProfile%\Local Settings\Application Data\JaxxLiberty\ServiceHub.IdentityHost.exe%UserProfile%\Local Settings\Application Data\protect.exe%userprofile%\local settings\application data\soloing.exe%UserProfile%\Local Settings\Application Data\Temp/Server.exe%USERPROFILE%\Local Settings\vrchost.exe%USERPROFILE%\Msframework.exe%USERPROFILE%\windefender.exe%USERPROFILE%\winlog.exe%USERPROFILE%\wins\bootloaders.exe%windir%\d.exe%WINDIR%\Debug\Publisher\Windows\chromes.exe%WINDIR%\Fonts\data\services.exe%WINDIR%\Fonts\sqlup32bit.exe%WINDIR%\pla\system\chromes.exe%WINDIR%\server_name.exe%WINDIR%\sistem.exe%WINDIR%\System32\[NUMBERS].bak%windir%\system32\appidlua.exe%windir%\system32\aticdxxfwd.dat%WINDIR%\system32\config\systemprofile\appdata\local\microsoft\windows\inetcache\ie\app[[NUMBERS]].exe%WINDIR%\system32\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\content.ie5\app[[NUMBERS]].exe%WINDIR%\System32\cubanjavamommy.exe%windir%\system32\drivers\etc\chromes.exe%WINDIR%\System32\Gold Fish.scr%WINDIR%\System32\skype.lnk%WINDIR%\System32\Tasks\Time Trigger Task%WINDIR%\system\my1.bat%WINDIR%\SysWOW64\[NUMBERS].bak%windir%\syswow64\appidlua.exe%windir%\syswow64\aticdxxfwd.dat%WINDIR%\syswow64\cubanjavamommy.exe%windir%\syswow64\groupsitka.exe%WINDIR%\SysWOW64\skype.lnk%WINDIR%\Tasks\Time Trigger Task.job%WINDIR%\temp\hey.exe%WINDIR%\win32.bat%windir%\windows api service.exe%WINDIR%\wmsvc.exeFile name without path34efcdsax.exe45grefcwd.exe45rfedc.exe4rfewgre.exe5trevtrf.exe[activator].exeadsseed.exebeleza.exebrtvecet4re.exebrtvr3ef.execdplayerassistv10.execdplayerassistv2.execdplayerassistv8.exeCriptografado.exef3eedrgvf.exefoto sexy.vbsh5t4grfed.exehygtrf4ed.exeminecraft.exe.rar.vbsn.vbsnyumyumnf.exeOh Shit.exeppplayerv3.0.tmpschool love and friends.exeseescenicelfb.exeseescenicelfq.exeseescenicelfx.exeSerives32.vbssystem.exe.exesystem3_.exetakmgr.exeWinDriv.urlXHeate3r.exeXOU Clock.scryouareanidiot.exeRegistry keySoftware\Cryptbot SoftwareSoftware\Microsoft\GcServicesSoftware\Microsoft\Windows\CurrentVersion\Run\Local Security Authority Subsystem ServiceSoftware\Microsoft\Windows\CurrentVersion\Run\startupnameSoftware\Microsoft\Windows\Run\CurrentVersionSoftware\Picture\rf44rfedSOFTWARE\TrustedLogosSoftware\US-Media CapitalSoftware\{C6D7ED1A-6343-4C1B-8AEC-2C36D31D7863}SYSTEM\ControlSet001\Services\NetfilterSvcSYSTEM\ControlSet002\Services\NetfilterSvcSYSTEM\CurrentControlSet\Services\NetfilterSvcHKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}eweew3grthrtvew_is1{13E374E4-E610-4F9E-ACC4-E461DA17D869}_is1{20A12947-909E-45F0-957B-8C23100E11A1}_is1{5082A4DA-0AA4-4C83-803B-1768F904FDB6}_is1{5BAD1C8A-1F21-4AF6-B1F1-A51AEC0AF2D4}_is1{97BF2403-89E3-46B1-A06F-78737FC8EC68}_is1{A85872A1-C7D3-48C2-8E83-8CFDE1A90A97}_is1{B6AFEAB8-DEEA-4147-8E70-D7733B5F7548}_is1{C058636C-2C48-4F5D-A933-7CCCD0C7F4EF}_is1{D6EDC6EC-5CF5-4407-9E7E-1E32326B68A0}_is1
Posted: June 26, 2013
Threat Metric
Threat Level: 7/10
Infected PCs 4,295,543
Home Malware Programs Malware UDS:DangerousObject.Multi.Generic

Leave a Reply

Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter. If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.