Su Licencia Ha Caducado Virus is a deceitful ransomware which is specifically targeted at Windows users living in Spanish-speaking countries. There is no doubt that the malicious program has been created and distributed by cyber criminals who know a few different ways to infiltrate the sinister infection without any of your knowledge. Unfortunately, it is impossible to say how the ransomware could be dropped onto your personal computer. Overall, you should stay away from suspicious links, online ads, pirated software downloads, spam email attachments and similar security vulnerabilities. Regardless, once the installation of the malicious program is initiated, it is most likely that you will not notice much difference to the way the PC works. Needless to say, you will not be able to miss the infection once it removes access to the system and displays the notification presented below. As this happens, your main task becomes Su Licencia Ha Caducado Virus removal.
Su licencia de Windows ha caducado, usted dispone de la Validacion por SMS, realize los siguientes pasos para obtener su nueva licencia de forma gratuita.
- Seleccione su pais y haga clic en “Verificar”:
- Envie un SMS con la palabra […] al […] y recibira un mensaje de verificacion.
Luego de recibir el mensaje de verificacion, reenvie el SMS para obtener un codigo de acceso.
Costo del SMS: Sin costo
As mentioned, the application is dangerous if you live in such countries as Spain, Mexico, Argentina or Venezuela because it is presented in Spanish. The alert declares that your Windows license is about to expire and that you need to send a free-of-charge verification SMS (text message). First of all, your Windows license cannot expire if it is legal, which means that the alert is completely bogus. Secondly, this particular text is not free as it has been developed to generate profit, and you should not waste your savings on a completely bogus cause! Overall, if you want to regain access to the web, you should delete Su Licencia Ha Caducado Virus from your personal computer, not send meaningless text messages.
If you live in Spanish-speaking areas, there are tens of different ransomware infections which could attack, including Policía Federal Argentina Virus, Cuerpo National De Policia Virus and Policía Boliviana Virus. Nonetheless, none of these infections are related to SMS scams. If your PC has been blocked by the aforementioned notification, do not pay any attention to the seemingly authentic Windows logo and immediately remove Su Licencia Ha Caducado Virus from the operating system. Even though manual removal is out of the questions, there are instructions which will help you install automatic removal software.
Remove from Windows 8:
Remove from Windows Vista and Windows 7:
Remove from Windows XP:
# | File Name | File Size (Bytes) | File Hash |
---|---|---|---|
1 | taskhost.exe.exe | 15872 bytes | MD5: 8cdc3a6a50af07cbdc4a1193e45f8721 |
2 | oygqyunapnp.exe | 78336 bytes | MD5: acdd61209ba5a132915c565f669b0d81 |
3 | ex3b.dll | 1792000 bytes | MD5: 992d5e68d52b908e744f0ea1db1deb89 |
4 | Nbt.exe | 643072 bytes | MD5: 90f72d0a2cc6956c07c46b47f6a3d40e |
5 | n. | 46592 bytes | MD5: 61a29236fee6568908a9bc629b8ada22 |
6 | uenovfiu.exe | 100864 bytes | MD5: 47ebbd7f529d71b8eac53b7ca0f7eeaa |
7 | wgsdgsdgdsgsd.exe | 144896 bytes | MD5: 3a8e4b69add412fd66d11c7ace416421 |
8 | puozlkmyj.dll | 356352 bytes | MD5: a36b0b1c2a6c4ad06418ab137b62ee6c |
9 | Piranha.exe | 449161 bytes | MD5: eb0f419c0a98b065271effae67c4920f |
10 | 50E1.exe | 340992 bytes | MD5: 0e337ac9e0242482503a3c31559ed661 |
11 | %CommonProgramFiles% | ||
12 | ACEIEAddOn.dll | 204800 bytes | MD5: f42778c8d316a0e2f45844f8051242ff |
13 | xlqbteeb.exe | 64512 bytes | MD5: 5f2861537c90cd2d3ec9620e67b91de7 |
14 | %WINDIR%\system32 | ||
15 | ssntvs.exe | 103415 bytes | MD5: 863c2d694dc3cf82711420aa089e16e4 |
16 | iner.exe | 674816 bytes | MD5: 6b485eb86c32deca15b26e47e66a94e7 |
17 | JfCqQ5JC.exe | 270336 bytes | MD5: 023829e50c93205ac81dd27009762620 |
18 | idiokbbrv.exe | 98448 bytes | MD5: 3cd07724cf408fc515a711042d4a0524 |
19 | Updating.exe | 1517520 bytes | MD5: e5d532e96f42229d89993da562fbb5b4 |
20 | yaiiwockc.dll | 483328 bytes | MD5: 9460de1c3485d5f3cc9f5fa1d4a09708 |
21 | %SystemDrive%\???????????? | ||
22 | UpgradeHelper.exe | 289792 bytes | MD5: 70f2dfab3a93558fec4dbc2d4b9d8a31 |
23 | Task Scheduler.exe | 122368 bytes | MD5: b923b9094635464cb81a245716d2d932 |
24 | ieudator.dll | 55808 bytes | MD5: bfe953f0f96438290914369a7797cf84 |
25 | C87C.exe | 79360 bytes | MD5: efe25f747cdc17ebebc22604c4cdd209 |
26 | wjthvwjb.dss | 221184 bytes | MD5: 9f2da2fd4fe9713d74acf0eb8fad8dc3 |
27 | %AppData% | ||
28 | crack.exe | 306176 bytes | MD5: ab5af9b01941bff73068abf9c7def3bd |
29 | 锿³•桌é¢ç¬¬ä¸‰æ–¹ä¸»é¢˜ç ´è§£è¡¥ä¸V1.1.exe | 188416 bytes | MD5: 5252ca014813b18c517ff44951628329 |
30 | 00b5d693.exe | 282112 bytes | MD5: 4dd835b5b72613c8f7fa71aed486b6c7 |
31 | %ALLUSERSPROFILE% | ||
32 | comeo.exe | 3581440 bytes | MD5: 17b063d029da62b8afc715880c0ae047 |
33 | wpbt0.dll | 225280 bytes | MD5: 3dfd93b751a0f9168739a7e668d14023 |
34 | administration.exe | 5242880 bytes | MD5: f3e4e59a27b1ed11ebf0330b02b408f7 |
35 | bzsbkotiu.exe | 233472 bytes | MD5: 35180a38939fe1b4368d804ae25e5a57 |
36 | WinSyncMetastore.exe | 83456 bytes | MD5: b7614742cc2adf0264a038267d35a78a |
37 | acuvzomo.exe | 61440 bytes | MD5: 64d6b4385310293e6ca81631c1652d59 |
38 | xmlfilter.exe | 115200 bytes | MD5: 0ecf7e220a38e4fd86a5d67e8ce7c88a |
39 | 87b2cb3916261d5c807bf44262755cb0.exe | 349184 bytes | MD5: f8717683a44fcfef00aed80e8332547b |
40 | %TEMP% | ||
41 | cf6640a77ed4926a4c6be661ab93def9d13408753dd07e8d02836996a2f247b6.exe | 462336 bytes | MD5: 0e3308e36ca702faf42e929a9d0b5c47 |
42 | pYunY8m4VL3qLc.exe | 286822 bytes | MD5: 3415bcb9153afa1e0c1400b2f7fa1335 |
43 | DA0B.exe | 61440 bytes | MD5: 15279561b4232d0600f4cede0d7de174 |
44 | %LOCALAPPDATA%\Temp | ||
45 | 00qbipeq.exe | 108032 bytes | MD5: b46bec93ed0cbf470b7a4e5421c30655 |
46 | install_0_msi.exe | 118272 bytes | MD5: 68f337adbfbdaad81faa7ea3ec22da0b |
47 | TimeDateMUICallback.exe | 87552 bytes | MD5: 2d108d8f3d914658f74768a8eb120dde |
48 | ctfmon.exe | 9216 bytes | MD5: d6d5126353edcb1f91aa210c3742de01 |
49 | UpdatePriv.exe | 65536 bytes | MD5: a29c0d8665033ec58739bebd1693727e |
50 | 2084473.dll | 92672 bytes | MD5: 4b53eef2de438858d7cc1360feb3c6c2 |
51 | gcrwcoak.exe | 108544 bytes | MD5: 095507587859038b638fe1c0d6c0c74c |
52 | dtkmujvo.exe | 87040 bytes | MD5: b8d2f2fb25bc89994c96079e6079a3ec |
53 | %LOCALAPPDATA%\lollipop | ||
54 | m2PythonLoader.exe | 135680 bytes | MD5: d8dab211e0db20f00118f25ad64be90c |
55 | WINDED6.exe | 126464 bytes | MD5: 77c854a9e5b39829d2ffc15767106ad9 |
56 | SyncHostps.exe | 94208 bytes | MD5: 286f4c7e06c1c467e58426b916985567 |
57 | msdtmsrd.exe | 224256 bytes | MD5: acf3959bb985b616f9b221ae15d252eb |
58 | %ALLUSERSPROFILE%\Application Data | ||
59 | svchost.exe | 417792 bytes | MD5: 805c3831ce41e9f7123398409d6b5c40 |
60 | najeoxtt.exe | 105984 bytes | MD5: d0761e37cdef392ee249e24c84f0a66c |
61 | setex.exe | 38759 bytes | MD5: 01da942199a8e606a09889a23f7d27b5 |
62 | obvwo.exe | 129024 bytes | MD5: e5893ac27c4ee6817f380e3607a3664c |
63 | pmstcdjwz.exe | 97344 bytes | MD5: dc30b025294d0ed58a16141e64942ff7 |
64 | mplayer2.exe | 403456 bytes | MD5: a01f673216f9a83cb352028319809f2f |
65 | 96dddda4.dll | 3303936 bytes | MD5: 522cb91f694f6866568b91b7a11f5802 |
66 | p1.exe | 95244 bytes | MD5: 5494478b81b9617fe10bbe5d12adb22d |
67 | msshell.exe | 18432 bytes | MD5: 0e9e0b2092e1c643f103d93f4a04b82a |
68 | wlsidten.dll | 155648 bytes | MD5: 26ca88d3fc9175797365a8553eb6948d |
69 | Other.res | 70656 bytes | MD5: 2122654109b372638bca24f780ea1921 |
70 | secproc_isv.exe | 108544 bytes | MD5: 25595c5104cafc7c667c73d1e2c74447 |
71 | msavfit.exe | 158208 bytes | MD5: 9f5e6c75851b2ee4b10e3e3b783d10b7 |
72 | dqnbdq7.dss | 175616 bytes | MD5: 6514a485b26fcca011121f42f188d3b2 |
73 | brenasa.exe | 45056 bytes | MD5: a626c9a877af7d078e67be021a5baf28 |
74 | msn.exe | 675840 bytes | MD5: a403f9d53ad6a07073c9236842dd865e |
75 | VaultSysUi.exe | 62464 bytes | MD5: e6922b3d1e2a74fa8620c4e004224a71 |
76 | bf8h8d02hf.exe | 315904 bytes | MD5: 1cbe49c0ebbeefbbe9f1c1fda9eebbe6 |
77 | csrsss.exe | 83928 bytes | MD5: c41898f24d84a4ada9fe9b71e94ccd64 |
78 | xaZYOVJW.exe | 133632 bytes | MD5: 4382872727fc8c0996fa315c599ecdf0 |
79 | hwj3ba6j.dss | 176640 bytes | MD5: 54f1a99f7cb18ed47756bb22e1681766 |
80 | Firewallservice.exe | 423424 bytes | MD5: 8f4305c63693259f648f33c59370978c |
81 | OmaSG21e.exe | 107520 bytes | MD5: 27baf21f123fe80b8e0bf2a3d0a9c91e |
82 | wahneaqa.exe | 102912 bytes | MD5: dfd58427f8741b480eae4d9535a1e5f3 |
83 | questscan.dll | 1019904 bytes | MD5: 0965f3611e919838ad794fcf11db43cf |
84 | dyjdl.exe | 194560 bytes | MD5: 5b94a572fd15f5416c4a88d02f406189 |
85 | ifgxpers.exe | 331648 bytes | MD5: 4765da2ba43a0ce9206d29c4c7aa76b6 |
86 | rvcbcyks.exe | 103424 bytes | MD5: e63bdd7e5eb894ca59900f155ad62158 |
87 | skype.dat | 65024 bytes | MD5: 13985f6b7ca5c771b28dbf42aef80984 |
88 | videotwisterSA.exe | 746496 bytes | MD5: a72b74832ff54293504f3c1b441db398 |
89 | DLL321.dll | 191712 bytes | MD5: bd6c2627b0f2e007d371f71edc0762a4 |
90 | rool0_pk.exe | 134144 bytes | MD5: a363c25160f5bb09bdaee0e03d85278c |
91 | bvhylsviw.exe | 98560 bytes | MD5: 4b1c6c2aabc0314f7558151834b63717 |
92 | MusicCollector.exe | 6901936 bytes | MD5: 42d5f1c904eae88de63cabeaa6a4bf50 |
93 | %APPDATA%\Task Scheduler | ||
94 | xctqakcqbeo.dll | 256000 bytes | MD5: bc5906995084024aeab23bdccd0d689f |
95 | NTServiceManager.exe | 666624 bytes | MD5: 8e931cb28a92d7ee1a7f146b7f6c4664 |
96 | systemcpl.exe | 100352 bytes | MD5: de7c781205d31f58a04d5acd13ff977d |
97 | Q3d38543.exe | 33280 bytes | MD5: 67f05820f38cf6ce319d92b55bae0956 |
98 | audipbrd.exe | 347648 bytes | MD5: 6ea827e7f4d182b0cb538cb5048bbdb2 |
99 | wlsidten.exe | 111616 bytes | MD5: 1f2052c6529cd8a76a20ce858f080e68 |
100 | msnmsgrr.exe | 1427968 bytes | MD5: 49300637db06b13f0bc0ee3b742e6399 |
101 | zqmkrehUkpoKfsafsaZg.exe | 33012 bytes | MD5: 461caa595d898e273656853c337d81c4 |
102 | %WINDIR%\Temp | ||
103 | %APPDATA%\system | ||
104 | %APPDATA%\updates | ||
105 | %UserProfile% | ||
106 | aPr0hY9.exe | 45558 bytes | MD5: 100b8f04f2bff5c49052173dc231eea1 |
107 | sqlncli.exe | 75264 bytes | MD5: 1b8b3b51d8b52bed7a7bc0b05bdafbcb |
108 | securitywindrv.exe | 34816 bytes | MD5: 0da8705f12382804c87d20ee58a4674c |
109 | scvhost.exe | 231936 bytes | MD5: 2dc8b92985e96aabc9ab0937f1018ff7 |
110 | {097444e7-2d87-ba3c-2efe-9f54812d824a}.exe | 293424 bytes | MD5: bd5b67eac856f4fafa612067b6a8ccfd |
111 | b34btbztdb0vavaw.exe | 149504 bytes | MD5: 6d5b32abb27fc4bc837a77c21a66813b |
112 | jsdhlexdqkllnbcxgai.bfg | 143360 bytes | MD5: 180f37b1ff8268ac2b95beee6989aba2 |
113 | 3511172082012Build.exe | 297984 bytes | MD5: 835c431d44e546ac46f899466acff0e1 |
114 | ubvhynpxh.exe | 223744 bytes | MD5: 3679444e7921794b3754ffb8ca80916b |