Guía de eliminación de Trojan Generic

Nivel de peligrosidad:
10/10
Puntuar este artículo:
Mensajes (1)
Veces que se ha leído este artículo: 88021
Categoría: Trojans

Trojan Generic es un parásito de equipo que se ha detectado en 2008 por primera vez y desde entonces ha sido infectando y afectan a un número de equipos en todo el mundo. Este troyano es un caso bastante complicado de seguridad informática, porque su nombre es utilizado frecuentemente por rogue antispyware en mensajes de alerta de seguridad falso el rogue envía al desprevenido usuario del equipo.

Sin embargo, Trojan Generic también puede ser un auténtico troyano que podría causar daños extremos en el equipo. Las advertencias de que vienen de su equipo sobre la actividad sospechosa pueden estar indicando la presencia de este troyano. Además, otros síntomas de la infección incluyen secuestro del navegador y contundente redirección a sitios relacionados con el malware y bloqueo de aplicaciones, cuando no eres capaz de ejecutar los programas de la forma en que se utiliza para.

Huelga decir la manera de que hacer frente a esta infección depende del tipo de la infección. Si Trojan Generic es sólo una parte de rogue antispyware falsas alertas y, a continuación, debe eliminar el rogue, porque en tal caso Trojan Generic no existe en el equipo. Esta infección debe tomar más en serio si está infectado con el real Trojan Generic.

Cuando Trojan Generic está instalado y en ejecución, abandona estos archivos en su sistema:

.tt19AD.tmp.exe
. tt1B5.tmp.exe
. tt1C.tmp.exe
. tt38.tmp.exe

También debe comprobar, si existen estos procesos que se ejecutan en el administrador de tareas de Windows mhtiedmsika.exe, MapDrive.exe, kuxuy.exe, kqfrybpdlta.exe. Están asociados con Trojan Generic, y eso es sólo una pequeña parte de los archivos que siga funcionando el troyano en el fondo de su sistema. Esa es una de las razones de por qué es difícil quitar manualmente Trojan Generic: hay muchos archivos y procesos para matar y eliminar.

Descarga desinstalador para Trojan Generic *
*El analizador de SpyHunter se puede descargar de esta página y sirve como herramienta de detección. Para utilizar su función de eliminación, será necesario adquirir la versión completa de SpyHunter.

Datos técnicos del manual de eliminación para Trojan Generic:

Archivos modificados/creados en el equipo:

# Nombre del archivo Tamaño del archivo (en bytes) Hash del archivo
1nl2.exe1918976 bytes
2dxva2C.dll62464 bytesMD5: 41cb45cccc9897274d77c847ba946b6d
3kedisuzo.dll50688 bytes
4zorihali.dll109281 bytes
5cmdial3.dll122368 bytes
6sujibiwi.dll50176 bytes
7pokumala.dll107520 bytes
8ofriasc.dll79360 bytesMD5: 158568bd1c1926d357b66f18397c4c11
9photo_id.exe27755 bytes
10kozeyizu.dll89088 bytes
11SystemAutorun.exe377344 bytesMD5: a1451e7535d918f60a31409acb76186a
12Warn Support.exe704512 bytes
13evizavohiyesupa.dll186880 bytesMD5: 93e22d9b2653be354a9214a8d1915d47
14nohisoye.dll108544 bytes
15ope2314.exe 401920 bytesMD5: 64e9e281d180395b1f60872930a8d19a
16UnLoad.exe37888 bytesMD5: 437f7b6ff7982015788b28d66f49ba2a
17wirepots.exe8704 bytesMD5: 4c1fd02d449c708d7708deb17f9dc6c5
18%ProgramFiles%\lphc?????????
19penipure.dll50688 bytes
20lepopoka.dll50688 bytes
21nl3.exe1891840 bytes
22bisevona.dll78848 bytes
23hesudobu.dll104960 bytes
24vupesasu.dll64512 bytesMD5: b5b5cc712268472c9e92b81f54a385c4
25mivi.exe171520 bytesMD5: 947f14f76240dc31ff436dc3ff906114
26mivalivo.dll49664 bytes
27mafuyiha.dll106496 bytes
28%SystemRoot%\System32
29kory.exe92672 bytesMD5: 0db0abdcf82af6f56402d11cca6ad0dd
30yowujeje.dll48640 bytes
31roam five.exe700416 bytes
32%UserProfile%\Application Data\643f??????????
33%ProgramFiles%\phc?????????
34nl6.exe1453056 bytes
35nl4.exe668160 bytes
36papororo.dll88576 bytes
37ClipHelp3xx.dll86016 bytesMD5: 0a102507a28680434a8231199c7ac913
38uvojigulukacega.dll181760 bytesMD5: 8ba96641c0cf6ba391ad8b6081ba36e7
39flsysio.exe371200 bytesMD5: 386e79decf1debf931692da686d2941f
40wahayaga.dll49664 bytes
41zemupalu.dll89600 bytes
42vosevodi.dll89088 bytes
43stuvwxy.exe
44asade.exe133120 bytesMD5: c5ed7ab3a7f1b367bc77480907a71274
45VCL.dll335064 bytesMD5: 85e369896d7049fa73dff2064a9df4db
46zyex.exe132608 bytesMD5: 1879ac641af2e71f26905cb048a07857
47hepigalo.exe
48yamanewa.dll80384 bytes
49baka6.exe144384 bytesMD5: c95ecdad9b7dabf9eb81b4cf50a1aa59
50mcfg.exe15360 bytesMD5: 3026b2ce720126c88cb8831e002a7f42
51%UserProfile%\bpph??????????
52zs880000[1].exe108032 bytes
53sysrc32.exe12288 bytes
54nevoputo.dll89600 bytes
55mutelupo.dll69632 bytes
56rexsvc32.exe1735854 bytesMD5: 5b0a5c74d78559d8a7367c9719cd40e5
57hehoyoze.dll50688 bytes
58zelovumi.dll49152 bytes
59%ProgramFiles%\bpph??????????
60nsx23.dll1351680 bytes
61futewege.dll49152 bytes
62doriyubi.dll49152 bytes
63bujiwofi.dll70144 bytes
64realsvc.exe143537 bytes
65vubabuku.dll48128 bytes
66muyinepa.dll80896 bytes
67ijucahalevet.dll181760 bytesMD5: a4687240401c1d4ef8e1bead595cbca3
68uqogumamumuse.dll183808 bytesMD5: f9dbaec1d7f298488edd7340029f808d
69icaqx.exe124414 bytesMD5: 36547fb1efeb3d949032ab5bf8040c76
70%SystemRoot%\System32\rhc?????????
71oviyukebicitaq.dll189952 bytesMD5: 26e0901133821a1a844fdf9f376a2220
72miduyevu.dll89600 bytes
73ufimixefenoy.dll257536 bytesMD5: b9407a6531a93d27f4a970f3b849ee9e
74digiwet.dll17920 bytes
75%UserProfile%\lphc?????????
76xydzyh.exe45056 bytes
77yovalono.dll49664 bytes
78topapope.dll80384 bytes
79refobaju.dll50688 bytes
80palowaru.dll48640 bytes
81bdsl2.dll86016 bytes
82uclyv.exe100352 bytesMD5: 904c33d27f3b145fbb9506955049d90b
83balomane.dll80384 bytes
84wujiwibe.dll88064 bytes
85fenofaki.dll87040 bytes
86%UserProfile%\Application Data\thc?????????
87dibawumi.dll89600 bytes
88%UserProfile%\Application Data\rhc?????????
89dizubure.dll66560 bytes
90ugavisidu.dll180224 bytesMD5: 6aa2d902c4637662f7dac98aabf95544
91ptidle.exe56832 bytes
92kulo.exe118850 bytesMD5: 8a37ecc0344edbdcff843f01e4db160a
93sonuleme.dll88064 bytes
941361163109.exe991232 bytesMD5: 9fcf0e8c39b00227ba76a1bdaee25480
95barijatu.dll50176 bytes
96%ProgramFiles%\thc?????????
97fechme.exe32768 bytes
98rigiwoti.dll81920 bytes
99beipq.exe169472 bytesMD5: ac12fcef12aec513bd5e8e8fcf389e1f
100nupanogo.dll107520 bytes
101kavumefe.dll81920 bytes
102poqii.exe147445 bytesMD5: 9372599a17d10580496c99fb50c62fdf
103juriyuyi.dll50688 bytes
104pjdeya.exe597504 bytesMD5: 5d4743a302e76421c449e8cfc2d8be2f
105kalerazo.dll88064 bytes
106livukafa.dll49664 bytes
107nobajanu.dll81408 bytes
108mulirowo.dll50688 bytes
109dodohovo.dll107520 bytes
110oderobifamaves.dll181248 bytesMD5: bcb38a3af170849ed800813980c098c5
111lebenesa.dll78848 bytes
112dmutil32.dll198656 bytes
113logomafe.dll88576 bytes
114ree2.exe748032 bytes
115fahokipa.dll86528 bytes
116dx8vb32.dll139264 bytes
117mukejowe.dll89600 bytes
118%UserProfile%\Application Data\blphc?????????
119odbn0.exe295424 bytes
120%UserProfile%
121%UserProfile%\blphc?????????
122iqugumamu.dll183296 bytesMD5: 3a18d024f36469eed2cc3ef1e6648725
123yosineku.dll89600 bytes
124%UserProfile%\Application Data\pphc?????????
125%UserProfile%\Application Data\whc?????????
126obaluqizevax.dll182784 bytesMD5: e18c0753f6729408f93832496a7085be
127uzewerilupavid.dll186368 bytesMD5: fa537293c1587d408722591ed4020a20
128uheludeje.dll173056 bytesMD5: b34cdd55229d93f43cebd8bac52597e6
129dot3cfg32.dll119808 bytes
130delidubu.dll89600 bytes
131asycfil.dll123904 bytes
132KBDURsr.dll62976 bytesMD5: e3beace9fb53c4ea2a2a5517d76b5b38
133vopereso.dll49152 bytes
134hoyuvuki.dll50176 bytes
135%SystemRoot%\System32\643f??????????
136Ffodoa.exe163840 bytesMD5: a5690ed0f4f2a3184fd469d5be888072
137togojaze.dll50176 bytes
138uyefesujoxumu.dll182784 bytesMD5: f42cc970e73eaee3d6419c9be9ced491
139oqifubeqixi.dll188416 bytesMD5: 611049af410f7421a4aa95dfaff83a06
140207163515.exe892416 bytesMD5: 695a8155cf64fa91f33241cb825a78c4
141ehczrw312.exe1150976 bytes
142cajiw.exe557056 bytesMD5: 6222d185dbfd393c9208e3e19cd3eee1
143uhoyureg.dll182272 bytesMD5: e27f0bd6b5d9af43fd35abaa37123f54
144DisplaySwitch.exe118272 bytesMD5: dde7ef6358e594956b13fc291d92e52a
145nutowuko.dll71680 bytes
146oyuwopoze.dll183296 bytesMD5: d49dfd4cf9dd4128c42423d2809f24dd
147afitegef.dll181248 bytesMD5: 561281ee46cf4df81d610382a80ec6aa
148wehebopa.dll50176 bytes
149%UserProfile%\thc?????????
150vabofoka.dll48128 bytes
151udihozazohec.dll197632 bytesMD5: 8e4bd6bf49fa29c52b564f0c3255cfed
152robejaku.dll88064 bytes
153jahasike.dll48128 bytes
154%SystemRoot%\System32\lphc?????????
155sekisahi.dll48128 bytes
156iksuy.exe140151 bytesMD5: cfc995ef0b0728896b5120c5adf214e0
157alivevukov.dll179712 bytesMD5: 64b417db53c23d036d2843b44c22bb7c
158hnwqrys.exe368896 bytesMD5: 3603e534db5178036425c5e6bcca8ee4
159nupotuku.dll48640 bytes
160akuzivazoveraxif.dll185344 bytesMD5: 8ccb115f9ae7f00b03e5fe57313915c9
161%UserProfile%\Application Data\phc?????????
162MySelf.exe571392 bytesMD5: 6e01f914fa6edf1df717b293d2265d68
163winlo.exe1220215 bytes
164bovekafu.dll89600 bytes
165vybi.exe115200 bytesMD5: dbdf452705cb7e45fee3063e1e12f99b
166hovebipu.dll48640 bytes
167%UserProfile%\643f??????????
168xipr.exe184848 bytes
169kifupiza.dll50176 bytes
170bdsyslink.dll86016 bytes
171%SystemRoot%\System32\bpph??????????
172%ProgramFiles%\whc?????????
173%ProgramFiles%\blphc?????????
174sumonibe.dll49152 bytes
175eloheseweriquyi.dll182272 bytesMD5: 351a14711242221e54e0a1920a82f4de
176luyehije.dll87552 bytes
177fezahoyu.dll81920 bytes
178irulusasiyuwam.dll178176 bytesMD5: 066db90be6f45540e15d1d928ab7f21d
179csrcs.exe20480 bytesMD5: fb52692745918a67cbd7e9cc26982627
180zezowawi.dll106496 bytes
181itufijorece.dll207360 bytesMD5: 3334de88ae7ce7034ff0b075ec923599
182%UserProfile%\whc?????????
183%ProgramFiles%\643f??????????
184%UserProfile%\Application Data\bpph??????????
185junefare.dll50688 bytes
186kusers.dll205840 bytes
187potibubi.dll50176 bytes
188yopalimi.dll106496 bytes
189%UserProfile%\pphc?????????
190kafunepi.dll80384 bytes
191%UserProfile%\phc?????????
192etomemap.dll179200 bytesMD5: 637e74ea2f3f3b948ca58a3f9fa9da53
193ree1.exe646656 bytes
194uqiwaceh.dll187392 bytesMD5: d7c17417a83ab2c658cb5c025f8f2500
195%UserProfile%\Application Data
196sgpron.dll62464 bytesMD5: 261b36cee988614c50f1d17100409f3d
197sihosido.dll108032 bytes
198kdpini.dll192528 bytes
199ufdsvc.exe69632 bytesMD5: 99184adc5b7fab997146971f20afff18
200%SystemRoot%\System32\thc?????????
201bdaplgini.dll84992 bytesMD5: deacbaa2ddf8597cdf1985e2950034d6
202sogidona.dll89088 bytes
203tikatabi.dll80384 bytes
204nl5.exe1464320 bytes
205dwm.exe318464 bytesMD5: b9ec59d036d43e1302083ef3e48b1311
206AdobeSoftVaallupjhn.exe507840 bytesMD5: 86c6ad598623186d95a83b4b86180ab4
207unapatax.dll182272 bytesMD5: 13c74cdba40b44b226697a503a1efe5f
208relereni.dll87552 bytes
209comparevers.exe455575 bytesMD5: 832ffbc37551be1f9b14dd44a462d3a8
210tepepife.dll70144 bytes
211sdasda.exe66560 bytes
212PowerJa.ask70777 bytes
213ovamudutibofe.dll195584 bytesMD5: 636d4967bd46a237f681c8339559688c
214emihotepopeg.dll187392 bytesMD5: 0df79c59f0e032e5bc995786d5815461
215jelayube.dll72861 bytes
216fehamito.dll50176 bytes
217fejolave.dll50688 bytes
218%TEMP%
219%UserProfile%\Application Data\lphc?????????
220ixelinet.dll182272 bytesMD5: a1b569c180afb2dd878a45bba9c078d4
221bopufeto.dll50176 bytes
222aboheraj.dll187904 bytesMD5: f9412fbd4707eca38cb794f439af6294
223zarebeba.dll50688 bytes
224morugawe.dll107520 bytes
225%SystemRoot%\System32\blphc?????????
226nuviyapi.dll49152 bytes
227onifr.exe147454 bytesMD5: 055c5d04c1cb3c4945637d38c7ba9933
228idolowun.dll180736 bytesMD5: 15689f041fb926413e423597a913f5e2
229bupuyafo.dll89088 bytes
230AcroIEHelpe022.dll216400 bytesMD5: 417958dc10a28999d539ca25fb35f884
231akihovojamaz.dll180224 bytesMD5: 859e7381425e73ec2d908216567448e4
232uyuhapuhid.dll195072 bytesMD5: 5f6b1405d57dc8df91144601b605e3ae
233zofowoda.dll50688 bytes
234ajuquqoqepoqu.dll179200 bytesMD5: 101c7b1219b42021916ee9f7b7836b23
235aim remote.exe683520 bytes
236idojapimogudoray.dll185344 bytesMD5: 6b08c208052f9e5cc2190d6801ac1b9e
237irxoe.exe116736 bytesMD5: 4f883bd12740c865a1765183767f979a
238%SystemRoot%\System32\whc?????????
239penis.exe90112 bytes
240nageduge.dll50688 bytes
241ijusuyanami.dll266240 bytesMD5: 39c5f01af18aa97ace2b61ff4040d4e6
242zipavagi.dll50688 bytes
243srenum.sys36480 bytes
244verabija.dll88064 bytes
245SerialsWorld.exe1075712 bytes
246wisysvi.dll67072 bytesMD5: cd5ecd06b63492fbcb6509dc20442631
247%UserProfile%\rhc?????????
248norozuse.dll69632 bytes
249xoipk.exe142848 bytesMD5: 97c65e1c3df2ea29ceb58b3390bd0b37
250%SystemRoot%\System32\phc?????????
251atl7.dll122368 bytes
252RqAds.exe135168 bytes
253lewiyidi.dll49664 bytes
254kbdnet.dll30720 bytes
255%SystemRoot%\System32\pphc?????????
256iyupodovujepope.dll194048 bytesMD5: 20df5aee46a31774c749f9945b711641
257omshtup.dll74752 bytesMD5: 5c4a9189143898c880c685baefe0949f
258juhalobo.dll109056 bytes
259lopibeki.dll70144 bytes
260reqi.exe116224 bytesMD5: fb482abc534c45584bfab8e7c621b2e6
261winmyy32.dll39424 bytes
262kurtapt24@yahoo.com9458 bytesMD5: 2e124646bd0fbe6838796bd181df0eef
263kekasika.dll49664 bytes
264fwtrtuqtssd.exe262144 bytesMD5: f3992fde36ff8e1ebb24d1e0f3cb95ea
265evejubet.dll194048 bytesMD5: 73b599d33ae2f39ef880ac2195ea6ce9
266qycu.exe133632 bytesMD5: 4f78005695709f8a9b48ec2598301d7d
267bawawaza.dll78848 bytes
268%ProgramFiles%\rhc?????????
269ibitolet.dll189952 bytesMD5: 233dc9f067988cb5a89f47f62276fc3f
270tijawani.dll50688 bytes
271pehuraba.dll88064 bytes
272Lxh.exe169472 bytesMD5: 9f4ab3be9eaba698dc0e0f7c73a95558
273kylo.exe116736 bytesMD5: 9393917d6f87dadf94d2ccaead23f380
274uvumaxeqa.dll186368 bytesMD5: 1d2f7578eeee5cd17d39e57dd6de31b0
275hukubuhu.dll69632 bytes
276debodoro.dll71168 bytes
277vcnews.exe2784256 bytesMD5: c8009d121e537630ee9d97578c4249e8
278dijanumo.dll133120 bytes
279jimofiji.dll49152 bytes
280pujosove.dll48640 bytes
281svcchosst.exe101376 bytes
282uqojanecatevih.dll182784 bytesMD5: 8a9effc288c73c50e8ccbd76f29f4f8f
283pascmgp.exe438272 bytesMD5: e18777a913aa00cdf543c89bd3e271cb
284mokehohi.dll69120 bytes
285eruzurow.dll180224 bytesMD5: 63178a01d821357152f686e70909bf3e
286%ProgramFiles%\pphc?????????
287icocalolacihir.dll182272 bytesMD5: a0f9b695b2711007dc5201a98de184f4
288idumowapupiy.dll183296 bytesMD5: 039e2ad7866d29aa5751b3810fd015fc
289%ProgramFiles%
290yatodimi.dll70144 bytes
291pivumedo.dll190976 bytes
292asvdxl.dll79872 bytesMD5: bc2780a2a6d2c21b76c8716975c10813
293nahatona.dll106496 bytes
294rdolib.dll30720 bytes
295fozusayo.dll49152 bytes
296bufezeza.dll80384 bytes
297yikuhawa.dll49152 bytes
298mejiyolo.dll88064 bytes
299pcpriv.exe397824 bytes
300caese.exe116736 bytesMD5: a3e5d6733da460ebf9d0c4332bb95f37

Modificaciones del registro:

Se han creado las siguientes claves de registro:

  • \YUR14.exe
  • SOFTWARE\Microsoft\Internet Explorer\Toolbar {8E21DC20-6E4E-42B3-9796-244EC9385CEF}
  • C:\WINDOWS\System32\kdwls.exe
  • advap32
  • Software\Microsoft\Windows\CurrentVersion kdksc.exe
  • \VIE14.exe
  • GetPack21
  • Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler {0ba3e00d-b660-46e6-a2db-2672ee82dc98}
  • \YUR12E.exe
  • \YURF.exe
  • SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE gi985993737
  • Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler {B2BA40A2-74F0-42BD-F434-12345A2C8953}
  • software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad xokvrpwg
  • Software\Microsoft\Internet Explorer\Explorer Bars {C2EC2654-52F0-3E63-9017-D0FA8FA79271}
  • Cognac
  • FixCamera
  • ROAD ITCH AMOK PING
  • SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad xrdwbfgn
  • \YUR130.exe
  • lljyn_df
  • {0389E53C-62CF-4CD6-9F4E-955A740E4385}
  • {E4785213-3EFE-4c26-A9B4-332440E31F6F}
  • penis.exe
  • Microsoft\Windows NT\CurrentVersion\Winlogon\Notify cxqmyibm
  • SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks {BB4C402F-882A-4526-8C08-51278EA437C1}
  • \YURA.exe
  • xydzyh
  • \YUR8.exe
  • \YUR2B.exe
  • \VIE5.exe
  • Software\Microsoft\Internet Explorer\Explorer Bars {EB9539EB-598E-BCA7-3D4A-82F4F26E9738}
  • \YUR15.exe
  • \YUR2.exe
  • software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad tfnslopk
  • \YUR1.exe
  • \Win13.exe
  • \YUR131.exe
  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run servises
  • \YUR2D.exe
  • cokx
  • Microsoft\Windows NT\CurrentVersion\Winlogon\Notify nnnkiGvV
  • \YUR4.exe
  • \YUR9.exe
  • \YUR13.exe
  • BIND SUPPORT SEEK FIRST
  • {09E23F2C-ED1E-43FC-9AA1-1332162A35AE}
  • Sys4.exe
  • \Win10.exe
  • Microsoft\Windows NT\CurrentVersion\Winlogon\Notify ssqPhEVM
  • \Win11.exe
  • Software\Microsoft\Windows\CurrentVersion kdmsh.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run xqe6lJLnN1
  • \YURE.exe
  • {157627A6-2A10-4aa1-B97F-90B8DC6F24AC}
  • Online Alert Manager
  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run andfor
  • \VIE2F.exe
  • \YUR30.exe
  • \YUR20.exe
  • memo site kind that
  • SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks {C14E6230-757D-4246-81CE-B34E2940C722}
  • %windir%\System32\kdmsh.exe
  • SerialsWorld
  • \YURC.exe
  • \YUR2C.exe
  • bone thunk axis copy
  • \YUR3.exe
  • Software\Microsoft\Internet Explorer\Explorer Bars {FCDEE81D-95A3-AE8A-D4FB-5A9FB8E32860}
  • GetPack19
  • SOFTWARE\Microsoft\Internet Explorer\Toolbar {3B4EFB6A-06FD-40AC-B072-1FB7D1D456E8}
  • \YURB.exe
  • 515.tmp
  • \VIE2.exe
  • \YUR6.exe
  • \YUR2A.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad fsrpknov
  • %windir%\System32\kdwls.exe
  • {78B578D7-BCE1-4d83-9CD4-195BC34D8CB3}
  • C:\WINDOWS\system32\kdswe.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad rwlfsdmk
  • Long Internet Team Stupid
  • Sys2.exe
  • Sys3.exe
  • Microsoft\Windows NT\CurrentVersion\Winlogon\Notify __c0040F39
  • {4D4DB474-8435-4FA1-8D91-512C0CE1E931}
  • \YUR10.exe
  • hlpproc
  • \VIE3.exe
  • \YURD.exe
  • Software\Microsoft\Internet Explorer\Explorer Bars {9CDB6E2A-B859-45BB-8F05-AF684301AB41}
  • Facegame
  • %windir%\system32\kdswe.exe
  • {3BCF8450-D134-427E-AE9C-2A42CE8215CC}
  • Captcha5
  • \YUR11.exe
  • \YUR18.exe
  • SOFTWARE\Microsoft\Internet Explorer\Toolbar {57776700-7BC8-47AC-B43E-99C24B015570}
  • Software\Microsoft\Windows\CurrentVersion kdid
  • SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks {D3CCFAF7-DF03-4E73-95EC-E5E139CC2BF2}
  • \Win14.exe
  • SmartMon
  • SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad fdxbameg
  • Somefox
  • Sys1.exe
  • F5JMWNZTHI
  • \YUR12.exe
  • ptidle
  • \YUR12F.exe
  • C:\WINDOWS\System32\kdmsh.exe
  • \Win12.exe
  • cont_mxlivemedia
  • vmdetdhc.exe
  • \YUR5.exe

Mensajes

  1. yo tengo eso mismo que tengo q hacer me salta el avg cada minuto

Publicar una respuesta

Tu email no se hará público.

Nombre
Sitio web
Mensaje

Introduzca los números en el cuadro a la derecha *