Information about spyware / malware file:
6.exe, bpsd.exe, errixpnp.dll, zlqusfc.dll, ppzaxim.dll, mbicajj.dll, pghztgc.dll, wina3.tmp.exe, videosaccess.exe, vkgrzzi.dll, qo3oyngp.dll, msmgr32.dll, xbrxsezy.exe, pmaa.dll, ubvdwcl.dll, txtcsdn.dll, stcheck32.exe, qdoncvoh.exe, asdjhweq.exe, qgaho26byg.exe, 45atq2v13x.exe, videoaccess.exe, prestoa1_6.exe, windowsupdate.exe, uorudgl.dll, stdrun4.exe, kpvwybg.dll, tyscapc.dll, glpfeli.dll, 69ab4090.exe, 69ab4090.dll, kkduusfsd.exe, 7k11_pk2.exe, videoaccess.exe, stcheck32.exe, pkjlytj.dll, nxtxqkd.dll, asdjhweq.exe, bleh_meow.exe, nouncompuser.exe, npkjkuyw.exe, soft_pt.exe, win169.tmp.exe, dvvln2mbxl.exe, videosaccess.exe, atrvc.dll, 57484847.exe, ibm00002.dll, ibm00001.dll, tlomc.exe, upayb.int, clic603.dll, pmcrt.dll, wsock.dll, ws_imod.dll, winnet.dll, winload.dll, rcpdi.dll, netp.dll, pstore.dll, msiphelp.dll, mcert.dll, gdip32.dll, credgui.dll, dc9.exe, bitdownloader.exe, 8e6c01.exe, y.dll, netempresa.exe, 1.exe, ywsnkhb.exe, winload.dll, dx3jcryp.exe, dx3jcryp.dll, dbmsdmds.dll, comrufat.dll, mmlmojwc.pif, wsock32k.dll, cjtjbalm.exe, fnownuyh.exe, scchk32.exe, rwera21s1.dll, atland.sys, fy.exe, loader.exe, ooze drv chin.exe, frag sixth logo.exe, does glue.exe, 3wplayer-1.0.0.3-setup.exe, d.exe, ra21s1.dll, rceewesdca1.dll, inserv.exe, c_8ept.dll, hnrzfig.dll, 1894164922.exe, keygen.exe, barb_proc.exe, flawmeet.exe, senduserextra.exe, zdkeyvsc.exe, a61a65a3.sys, de.tmp.taras, rnhmplss.dll, jexjdihj.dll, maedwnrs.dll, melni4eg.exe, 41d8f4e.htm, sfmapi32.dll, swprv32.dll, bronto.dll, oleacc32.dll, twjsdstc.dll, sqarphbc.exe, mlfwxpeb.exe, gdngb2093.exe, ixrhawsm.exe, bglsxsbm.dll, fobufuxa.dll, core.sys, axebmbrpl6.exe, helper.exe, ielog.dll, keygen.exe, portexplorer.exe, procguard.exe, divocodec.exe, fci.exe, sanovjwi.exe, perupuhc.exe, bihkrmdi.dll, jo_4637.vir, pgburane.exe, ftpsystem.dll, dhcpserv.dll, kbdsdf.dll, regapi32.dll, tkdqtono.exe
|
Spyware / Malware Description:
Trojan.Win32.Obfuscated
Type: |
Trojan |
Type Description: |
Software used to break into user system and grant access to the user data or perform malicious actions. |
Level of Danger: |
High |
Default action: |
Remove |
File names: |
6.exe, bpsd.exe, errixpnp.dll, zlqusfc.dll, ppzaxim.dll, mbicajj.dll, pghztgc.dll, wina3.tmp.exe, videosaccess.exe, vkgrzzi.dll, qo3oyngp.dll, msmgr32.dll, xbrxsezy.exe, pmaa.dll, ubvdwcl.dll, txtcsdn.dll, stcheck32.exe, qdoncvoh.exe, asdjhweq.exe, qgaho26byg.exe, 45atq2v13x.exe, videoaccess.exe, prestoa1_6.exe, windowsupdate.exe, uorudgl.dll, stdrun4.exe, kpvwybg.dll, tyscapc.dll, glpfeli.dll, 69ab4090.exe, 69ab4090.dll, kkduusfsd.exe, 7k11_pk2.exe, videoaccess.exe, stcheck32.exe, pkjlytj.dll, nxtxqkd.dll, asdjhweq.exe, bleh_meow.exe, nouncompuser.exe, npkjkuyw.exe, soft_pt.exe, win169.tmp.exe, dvvln2mbxl.exe, videosaccess.exe, atrvc.dll, 57484847.exe, ibm00002.dll, ibm00001.dll, tlomc.exe, upayb.int, clic603.dll, pmcrt.dll, wsock.dll, ws_imod.dll, winnet.dll, winload.dll, rcpdi.dll, netp.dll, pstore.dll, msiphelp.dll, mcert.dll, gdip32.dll, credgui.dll, dc9.exe, bitdownloader.exe, 8e6c01.exe, y.dll, netempresa.exe, 1.exe, ywsnkhb.exe, winload.dll, dx3jcryp.exe, dx3jcryp.dll, dbmsdmds.dll, comrufat.dll, mmlmojwc.pif, wsock32k.dll, cjtjbalm.exe, fnownuyh.exe, scchk32.exe, rwera21s1.dll, atland.sys, fy.exe, loader.exe, ooze drv chin.exe, frag sixth logo.exe, does glue.exe, 3wplayer-1.0.0.3-setup.exe, d.exe, ra21s1.dll, rceewesdca1.dll, inserv.exe, c_8ept.dll, hnrzfig.dll, 1894164922.exe, keygen.exe, barb_proc.exe, flawmeet.exe, senduserextra.exe, zdkeyvsc.exe, a61a65a3.sys, de.tmp.taras, rnhmplss.dll, jexjdihj.dll, maedwnrs.dll, melni4eg.exe, 41d8f4e.htm, sfmapi32.dll, swprv32.dll, bronto.dll, oleacc32.dll, twjsdstc.dll, sqarphbc.exe, mlfwxpeb.exe, gdngb2093.exe, ixrhawsm.exe, bglsxsbm.dll, fobufuxa.dll, core.sys, axebmbrpl6.exe, helper.exe, ielog.dll, keygen.exe, portexplorer.exe, procguard.exe, divocodec.exe, fci.exe, sanovjwi.exe, perupuhc.exe, bihkrmdi.dll, jo_4637.vir, pgburane.exe, ftpsystem.dll, dhcpserv.dll, kbdsdf.dll, regapi32.dll, tkdqtono.exe |
Fingerprints: |
- |
|
|
|
|