Trojan Generic Removal Guide

Threat Level:
10/10
Rate this Article:
Comments (1)
Article Views: 80769
Category: Trojans

Trojan Generic is a computer parasite that was detected in 2008 for the first time, and ever since has been infecting and plaguing numbers of computers worldwide. This Trojan is a rather tricky case of computer security, because its name is also frequently used by rogue antispyware in fake security alert messages that the rogue sends to unsuspecting computer user. So sometimes it can be hard to say whether you are really infected with Trojan Generic or whether it is simply a fake notification from a false antivirus program.

However, Trojan Generic can also be a genuine Trojan that could cause extreme damage to your computer. The warnings that come from your computer system about suspicious activity can be indicating the presence of this Trojan. Also, other symptoms of the infection include browser hijacking and forceful redirection to malware-related sites, and crashing applications, when you are not able to run your programs the way you are used to. Then you should really take notice of Trojan Generic and remove it from your computer at once.

Needless to say, that the way you deal with this infection depends on the type of the infection. If Trojan Generic is only a part of rogue antispyware fake alert notifications, then you need to delete the rogue itself, because in such case Trojan Generic does not exist in your computer. You should take this infection more seriously if you are infected with the real Trojan Generic. The way to know whether you are infected or not is to check for the files associated with this Trojan in your system.

When Trojan Generic is installed and running, it leaves these files in your system:

.tt19AD.tmp.exe
.tt1B5.tmp.exe
.tt1C.tmp.exe
.tt38.tmp.exe

You should also check, whether there are these processes running in your Windows Task Manager mhtiedmsika.exe, MapDrive.exe, kuxuy.exe, kqfrybpdlta.exe. They are associated with Trojan Generic, and that is just a small part of files that the Trojan keeps running in the background of your system. That is also one of the reasons why it is hard to remove Trojan Generic manually – there are many files and processes to kill and delete. Therefore you are advised to acquire a powerful security tool that would be capable of dealing with this Trojan. You need to understand that with this pest in your system, you privacy is breached and you personal information might be leaked over the Internet, so erase Trojan Generic as soon as possible without any trace left.

Download Remover for Trojan Generic *
*SpyHunter scanner, published on this site, is intended to be used only as a detection tool. To use the removal functionality, you will need to purchase the full version of SpyHunter.

Trojan Generic technical info for manual removal:

Files Modified/Created on the system:

# File Name File Size (Bytes) File Hash
1%SystemRoot%\System32\phc?????????
2%ProgramFiles%\lphc?????????
3%TEMP%
4tikatabi.dll80384 bytes
5penis.exe90112 bytes
6%UserProfile%\Application Data
7kurtapt24@yahoo.com9458 bytesMD5: 2e124646bd0fbe6838796bd181df0eef
8%SystemRoot%\System32
9hehoyoze.dll50688 bytes
10vubabuku.dll48128 bytes
11dijoromo.dll50176 bytes
12hnwqrys.exe368896 bytesMD5: 3603e534db5178036425c5e6bcca8ee4
13zorihali.dll109281 bytes
14kifupiza.dll50176 bytes
15hesudobu.dll104960 bytes
16wujiwibe.dll88064 bytes
17barijatu.dll50176 bytes
18flsysio.exe371200 bytesMD5: 386e79decf1debf931692da686d2941f
19Ffodoa.exe163840 bytesMD5: a5690ed0f4f2a3184fd469d5be888072
20lewiyidi.dll49664 bytes
21nsx23.dll1351680 bytes
22%SystemRoot%\System32\lphc?????????
23fezahoyu.dll81920 bytes
24%ProgramFiles%\643f??????????
25jimofiji.dll49152 bytes
26caese.exe116736 bytesMD5: a3e5d6733da460ebf9d0c4332bb95f37
27nl5.exe1464320 bytes
28dxva2C.dll62464 bytesMD5: 41cb45cccc9897274d77c847ba946b6d
29vcnews.exe2784256 bytesMD5: c8009d121e537630ee9d97578c4249e8
30pulobuha.dll109056 bytes
31nobajanu.dll81408 bytes
32digiwet.dll17920 bytes
33oyuwopoze.dll183296 bytesMD5: d49dfd4cf9dd4128c42423d2809f24dd
34%UserProfile%\Application Data\pphc?????????
35%UserProfile%\643f??????????
36mulirowo.dll50688 bytes
37yopalimi.dll106496 bytes
38%UserProfile%\whc?????????
39bupuyafo.dll89088 bytes
40%SystemRoot%\System32\blphc?????????
41uheludeje.dll173056 bytesMD5: b34cdd55229d93f43cebd8bac52597e6
42livukafa.dll49664 bytes
43MySelf.exe571392 bytesMD5: 6e01f914fa6edf1df717b293d2265d68
44iksuy.exe140151 bytesMD5: cfc995ef0b0728896b5120c5adf214e0
45fechme.exe32768 bytes
46poqii.exe147445 bytesMD5: 9372599a17d10580496c99fb50c62fdf
47togojaze.dll50176 bytes
48dx8vb32.dll139264 bytes
49uyefesujoxumu.dll182784 bytesMD5: f42cc970e73eaee3d6419c9be9ced491
50lepopoka.dll50688 bytes
51irulusasiyuwam.dll178176 bytesMD5: 066db90be6f45540e15d1d928ab7f21d
52odbn0.exe295424 bytes
53zogonaha.dll108544 bytes
54idumowapupiy.dll183296 bytesMD5: 039e2ad7866d29aa5751b3810fd015fc
55%UserProfile%\Application Data\thc?????????
56%ProgramFiles%\bpph??????????
57sysrc32.exe12288 bytes
58bufezeza.dll80384 bytes
59uqojanecatevih.dll182784 bytesMD5: 8a9effc288c73c50e8ccbd76f29f4f8f
60dodohovo.dll107520 bytes
61%ProgramFiles%\rhc?????????
62aim remote.exe683520 bytes
63papororo.dll88576 bytes
64%UserProfile%
65%UserProfile%\Application Data\rhc?????????
66tipifipo.dll109056 bytes
67asvdxl.dll79872 bytesMD5: bc2780a2a6d2c21b76c8716975c10813
68yovalono.dll49664 bytes
69lopibeki.dll70144 bytes
70nl6.exe1453056 bytes
71sgpron.dll62464 bytesMD5: 261b36cee988614c50f1d17100409f3d
72obaluqizevax.dll182784 bytesMD5: e18c0753f6729408f93832496a7085be
73nahatona.dll106496 bytes
74sdasda.exe66560 bytes
75%UserProfile%\thc?????????
76kylo.exe116736 bytesMD5: 9393917d6f87dadf94d2ccaead23f380
77SystemAutorun.exe377344 bytesMD5: a1451e7535d918f60a31409acb76186a
78icaqx.exe124414 bytesMD5: 36547fb1efeb3d949032ab5bf8040c76
79wehebopa.dll50176 bytes
80hoyuvuki.dll50176 bytes
81sonuleme.dll88064 bytes
82photo_id.exe27755 bytes
83onifr.exe147454 bytesMD5: 055c5d04c1cb3c4945637d38c7ba9933
84bdaplgini.dll84992 bytesMD5: deacbaa2ddf8597cdf1985e2950034d6
85ree1.exe646656 bytes
86UnLoad.exe37888 bytesMD5: 437f7b6ff7982015788b28d66f49ba2a
87%ProgramFiles%\thc?????????
88kavumefe.dll81920 bytes
89SerialsWorld.exe1075712 bytes
90realsvc.exe143537 bytes
91mutelupo.dll69632 bytes
92bisevona.dll78848 bytes
93kozeyizu.dll89088 bytes
94zarebeba.dll50688 bytes
95winmyy32.dll39424 bytes
96viyiyini.dll88064 bytes
97etomemap.dll179200 bytesMD5: 637e74ea2f3f3b948ca58a3f9fa9da53
98hepigalo.exe
99%UserProfile%\phc?????????
100oqifubeqixi.dll188416 bytesMD5: 611049af410f7421a4aa95dfaff83a06
101itufijorece.dll207360 bytesMD5: 3334de88ae7ce7034ff0b075ec923599
102wahayaga.dll49664 bytes
103pokumala.dll107520 bytes
104ClipHelp3xx.dll86016 bytesMD5: 0a102507a28680434a8231199c7ac913
105afitegef.dll181248 bytesMD5: 561281ee46cf4df81d610382a80ec6aa
106zipavagi.dll50688 bytes
107verabija.dll88064 bytes
108csrcs.exe20480 bytesMD5: fb52692745918a67cbd7e9cc26982627
109ijucahalevet.dll181760 bytesMD5: a4687240401c1d4ef8e1bead595cbca3
110ugavisidu.dll180224 bytesMD5: 6aa2d902c4637662f7dac98aabf95544
111weluyiki.dll107520 bytes
112%ProgramFiles%\blphc?????????
113asade.exe133120 bytesMD5: c5ed7ab3a7f1b367bc77480907a71274
114%ProgramFiles%\phc?????????
115%ProgramFiles%
116iqugumamu.dll183296 bytesMD5: 3a18d024f36469eed2cc3ef1e6648725
117zs880000[1].exe108032 bytes
118zyex.exe132608 bytesMD5: 1879ac641af2e71f26905cb048a07857
119kekasika.dll49664 bytes
120vopereso.dll49152 bytes
121bdsyslink.dll86016 bytes
122uqogumamumuse.dll183808 bytesMD5: f9dbaec1d7f298488edd7340029f808d
123dijipire.dll70144 bytes
124hekeyapi.dll89088 bytes
125rdolib.dll30720 bytes
126dwm.exe318464 bytesMD5: b9ec59d036d43e1302083ef3e48b1311
127ufimixefenoy.dll257536 bytesMD5: b9407a6531a93d27f4a970f3b849ee9e
128roam five.exe700416 bytes
129ixelinet.dll182272 bytesMD5: a1b569c180afb2dd878a45bba9c078d4
130rexsvc32.exe1735854 bytesMD5: 5b0a5c74d78559d8a7367c9719cd40e5
131stuvwxy.exe
132%UserProfile%\Application Data\phc?????????
133tijawani.dll50688 bytes
134xydzyh.exe45056 bytes
135kusewovi.dll69120 bytes
136pujosove.dll48640 bytes
137AdobeSoftVaallupjhn.exe507840 bytesMD5: 86c6ad598623186d95a83b4b86180ab4
138akuzivazoveraxif.dll185344 bytesMD5: 8ccb115f9ae7f00b03e5fe57313915c9
139ufdsvc.exe69632 bytesMD5: 99184adc5b7fab997146971f20afff18
140relereni.dll87552 bytes
141pivumedo.dll190976 bytes
142sumonibe.dll49152 bytes
143icocalolacihir.dll182272 bytesMD5: a0f9b695b2711007dc5201a98de184f4
144uzewerilupavid.dll186368 bytesMD5: fa537293c1587d408722591ed4020a20
145ibitolet.dll189952 bytesMD5: 233dc9f067988cb5a89f47f62276fc3f
146nl2.exe1918976 bytes
147AcroIEHelpe022.dll216400 bytesMD5: 417958dc10a28999d539ca25fb35f884
148svcchosst.exe101376 bytes
149vybi.exe115200 bytesMD5: dbdf452705cb7e45fee3063e1e12f99b
150uqiwaceh.dll187392 bytesMD5: d7c17417a83ab2c658cb5c025f8f2500
151kufefele.dll50688 bytes
152comparevers.exe455575 bytesMD5: 832ffbc37551be1f9b14dd44a462d3a8
153mcfg.exe15360 bytesMD5: 3026b2ce720126c88cb8831e002a7f42
154vabofoka.dll48128 bytes
155idolowun.dll180736 bytesMD5: 15689f041fb926413e423597a913f5e2
156vosevodi.dll89088 bytes
157irxoe.exe116736 bytesMD5: 4f883bd12740c865a1765183767f979a
158nevoputo.dll89600 bytes
159bdsl2.dll86016 bytes
160logomafe.dll88576 bytes
161debodoro.dll71168 bytes
162juhalobo.dll109056 bytes
163jahasike.dll48128 bytes
164balomane.dll80384 bytes
165kdpini.dll192528 bytes
166PowerJa.ask70777 bytes
167dmutil32.dll198656 bytes
168%UserProfile%\lphc?????????
169fahokipa.dll86528 bytes
170ope2314.exe 401920 bytesMD5: 64e9e281d180395b1f60872930a8d19a
171rigiwoti.dll81920 bytes
172fwtrtuqtssd.exe262144 bytesMD5: f3992fde36ff8e1ebb24d1e0f3cb95ea
173zezowawi.dll106496 bytes
174kulo.exe118850 bytesMD5: 8a37ecc0344edbdcff843f01e4db160a
175eloheseweriquyi.dll182272 bytesMD5: 351a14711242221e54e0a1920a82f4de
176ree2.exe748032 bytes
1771361163109.exe991232 bytesMD5: 9fcf0e8c39b00227ba76a1bdaee25480
178%UserProfile%\Application Data\blphc?????????
179%UserProfile%\Application Data\bpph??????????
180potibubi.dll50176 bytes
181wisysvi.dll67072 bytesMD5: cd5ecd06b63492fbcb6509dc20442631
182nageduge.dll50688 bytes
183luyehije.dll87552 bytes
184uyuhapuhid.dll195072 bytesMD5: 5f6b1405d57dc8df91144601b605e3ae
185kbdnet.dll30720 bytes
186srenum.sys36480 bytes
187delidubu.dll89600 bytes
188reqi.exe116224 bytesMD5: fb482abc534c45584bfab8e7c621b2e6
189cmdial3.dll122368 bytes
190%ProgramFiles%\pphc?????????
191Warn Support.exe704512 bytes
192nl4.exe668160 bytes
193pofolehe.dll51200 bytes
194ajuquqoqepoqu.dll179200 bytesMD5: 101c7b1219b42021916ee9f7b7836b23
195pascmgp.exe438272 bytesMD5: e18777a913aa00cdf543c89bd3e271cb
196qycu.exe133632 bytesMD5: 4f78005695709f8a9b48ec2598301d7d
197unapatax.dll182272 bytesMD5: 13c74cdba40b44b226697a503a1efe5f
198KBDURsr.dll62976 bytesMD5: e3beace9fb53c4ea2a2a5517d76b5b38
199bawawaza.dll78848 bytes
200pcpriv.exe397824 bytes
201dowikabu.dll87552 bytes
202hukubuhu.dll69632 bytes
203Lxh.exe169472 bytesMD5: 9f4ab3be9eaba698dc0e0f7c73a95558
204doriyubi.dll49152 bytes
205RqAds.exe135168 bytes
206%SystemRoot%\System32\pphc?????????
207%SystemRoot%\System32\bpph??????????
208evejubet.dll194048 bytesMD5: 73b599d33ae2f39ef880ac2195ea6ce9
209zofowoda.dll50688 bytes
210ovamudutibofe.dll195584 bytesMD5: 636d4967bd46a237f681c8339559688c
211dizubure.dll66560 bytes
212mafuyiha.dll106496 bytes
213ijusuyanami.dll266240 bytesMD5: 39c5f01af18aa97ace2b61ff4040d4e6
214nl3.exe1891840 bytes
215zesanido.dll50176 bytes
216%ProgramFiles%\whc?????????
217powamahe.dll109056 bytes
218fozusayo.dll49152 bytes
219%UserProfile%\pphc?????????
220sekisahi.dll48128 bytes
221kusers.dll205840 bytes
222dijanumo.dll133120 bytes
223atl7.dll122368 bytes
224%UserProfile%\Application Data\643f??????????
225vupesasu.dll64512 bytesMD5: b5b5cc712268472c9e92b81f54a385c4
226asycfil.dll123904 bytes
227idojapimogudoray.dll185344 bytesMD5: 6b08c208052f9e5cc2190d6801ac1b9e
228udihozazohec.dll197632 bytesMD5: 8e4bd6bf49fa29c52b564f0c3255cfed
229kafunepi.dll80384 bytes
230uvojigulukacega.dll181760 bytesMD5: 8ba96641c0cf6ba391ad8b6081ba36e7
231sujibiwi.dll50176 bytes
232oviyukebicitaq.dll189952 bytesMD5: 26e0901133821a1a844fdf9f376a2220
233juriyuyi.dll50688 bytes
234%SystemRoot%\System32\whc?????????
235%UserProfile%\Application Data\whc?????????
236mukejowe.dll89600 bytes
237DisplaySwitch.exe118272 bytesMD5: dde7ef6358e594956b13fc291d92e52a
238penipure.dll50688 bytes
239xipr.exe184848 bytes
240akihovojamaz.dll180224 bytesMD5: 859e7381425e73ec2d908216567448e4
241wirepots.exe8704 bytesMD5: 4c1fd02d449c708d7708deb17f9dc6c5
242%SystemRoot%\System32\thc?????????
243yosineku.dll89600 bytes
244yamanewa.dll80384 bytes
245yowujeje.dll48640 bytes
246uhoyureg.dll182272 bytesMD5: e27f0bd6b5d9af43fd35abaa37123f54
247palowaru.dll48640 bytes
248ehczrw312.exe1150976 bytes
249lebenesa.dll78848 bytes
250uclyv.exe100352 bytesMD5: 904c33d27f3b145fbb9506955049d90b
251norozuse.dll69632 bytes
252bovekafu.dll89600 bytes
253tipiyipo.dll89600 bytes
254beipq.exe169472 bytesMD5: ac12fcef12aec513bd5e8e8fcf389e1f
255eruzurow.dll180224 bytesMD5: 63178a01d821357152f686e70909bf3e
256winlo.exe1220215 bytes
257nuviyapi.dll49152 bytes
258sihosido.dll108032 bytes
259fejolave.dll50688 bytes
260%UserProfile%\blphc?????????
261xoipk.exe142848 bytesMD5: 97c65e1c3df2ea29ceb58b3390bd0b37
262kory.exe92672 bytesMD5: 0db0abdcf82af6f56402d11cca6ad0dd
263junefare.dll50688 bytes
264%SystemRoot%\System32\643f??????????
265mivi.exe171520 bytesMD5: 947f14f76240dc31ff436dc3ff906114
266emihotepopeg.dll187392 bytesMD5: 0df79c59f0e032e5bc995786d5815461
267dot3cfg32.dll119808 bytes
268oderobifamaves.dll181248 bytesMD5: bcb38a3af170849ed800813980c098c5
269cajiw.exe557056 bytesMD5: 6222d185dbfd393c9208e3e19cd3eee1
270alivevukov.dll179712 bytesMD5: 64b417db53c23d036d2843b44c22bb7c
271evizavohiyesupa.dll186880 bytesMD5: 93e22d9b2653be354a9214a8d1915d47
272aboheraj.dll187904 bytesMD5: f9412fbd4707eca38cb794f439af6294
273jelayube.dll72861 bytes
274topapope.dll80384 bytes
275sogidona.dll89088 bytes
276mejiyolo.dll88064 bytes
277%UserProfile%\bpph??????????
278hovebipu.dll48640 bytes
279bopufeto.dll50176 bytes
280omshtup.dll74752 bytesMD5: 5c4a9189143898c880c685baefe0949f
281fenofaki.dll87040 bytes
282robejaku.dll88064 bytes
283baka6.exe144384 bytesMD5: c95ecdad9b7dabf9eb81b4cf50a1aa59
284nupotuku.dll48640 bytes
285ofriasc.dll79360 bytesMD5: 158568bd1c1926d357b66f18397c4c11
286uvumaxeqa.dll186368 bytesMD5: 1d2f7578eeee5cd17d39e57dd6de31b0
287VCL.dll335064 bytesMD5: 85e369896d7049fa73dff2064a9df4db
288%UserProfile%\Application Data\lphc?????????
289muyinepa.dll80896 bytes
290%UserProfile%\rhc?????????
291%SystemRoot%\System32\rhc?????????
292zelovumi.dll49152 bytes
293iyupodovujepope.dll194048 bytesMD5: 20df5aee46a31774c749f9945b711641
294ptidle.exe56832 bytes
295miduyevu.dll89600 bytes
296yatodimi.dll70144 bytes
297mivalivo.dll49664 bytes
298pjdeya.exe597504 bytesMD5: 5d4743a302e76421c449e8cfc2d8be2f
299zemupalu.dll89600 bytes
300207163515.exe892416 bytesMD5: 695a8155cf64fa91f33241cb825a78c4

Files in the following directories were modified:

  • %SystemRoot%\System32
  • %ProgramFiles%
  • %UserProfile%
  • %SystemRoot%
  • %UserProfile%\Application Data

Memory Processes Created:

# Process Name Process Filename Main module size
1penis.exepenis.exe90112 bytes
2hnwqrys.exehnwqrys.exe368896 bytes
3flsysio.exeflsysio.exe371200 bytes
4Ffodoa.exeFfodoa.exe163840 bytes
5caese.execaese.exe116736 bytes
6nl5.exenl5.exe1464320 bytes
7vcnews.exevcnews.exe2784256 bytes
8MySelf.exeMySelf.exe571392 bytes
9iksuy.exeiksuy.exe140151 bytes
10fechme.exefechme.exe32768 bytes
11poqii.exepoqii.exe147445 bytes
12odbn0.exeodbn0.exe295424 bytes
13sysrc32.exesysrc32.exe12288 bytes
14aim remote.exeaim remote.exe683520 bytes
15nl6.exenl6.exe1453056 bytes
16sdasda.exesdasda.exe66560 bytes
17kylo.exekylo.exe116736 bytes
18SystemAutorun.exeSystemAutorun.exe377344 bytes
19icaqx.exeicaqx.exe124414 bytes
20photo_id.exephoto_id.exe27755 bytes
21onifr.exeonifr.exe147454 bytes
22ree1.exeree1.exe646656 bytes
23UnLoad.exeUnLoad.exe37888 bytes
24SerialsWorld.exeSerialsWorld.exe1075712 bytes
25realsvc.exerealsvc.exe143537 bytes
26hepigalo.exehepigalo.exe
27csrcs.execsrcs.exe20480 bytes
28asade.exeasade.exe133120 bytes
29zs880000[1].exezs880000[1].exe108032 bytes
30zyex.exezyex.exe132608 bytes
31dwm.exedwm.exe318464 bytes
32roam five.exeroam five.exe700416 bytes
33rexsvc32.exerexsvc32.exe1735854 bytes
34stuvwxy.exestuvwxy.exe
35xydzyh.exexydzyh.exe45056 bytes
36AdobeSoftVaallupjhn.exeAdobeSoftVaallupjhn.exe507840 bytes
37ufdsvc.exeufdsvc.exe69632 bytes
38nl2.exenl2.exe1918976 bytes
39svcchosst.exesvcchosst.exe101376 bytes
40vybi.exevybi.exe115200 bytes
41comparevers.execomparevers.exe455575 bytes
42mcfg.exemcfg.exe15360 bytes
43irxoe.exeirxoe.exe116736 bytes
44ope2314.exeope2314.exe401920 bytes
45fwtrtuqtssd.exefwtrtuqtssd.exe262144 bytes
46kulo.exekulo.exe118850 bytes
47ree2.exeree2.exe748032 bytes
481361163109.exe1361163109.exe991232 bytes
49reqi.exereqi.exe116224 bytes
50Warn Support.exeWarn Support.exe704512 bytes
51nl4.exenl4.exe668160 bytes
52pascmgp.exepascmgp.exe438272 bytes
53qycu.exeqycu.exe133632 bytes
54pcpriv.exepcpriv.exe397824 bytes
55Lxh.exeLxh.exe169472 bytes
56RqAds.exeRqAds.exe135168 bytes
57nl3.exenl3.exe1891840 bytes
58DisplaySwitch.exeDisplaySwitch.exe118272 bytes
59xipr.exexipr.exe184848 bytes
60wirepots.exewirepots.exe8704 bytes
61ehczrw312.exeehczrw312.exe1150976 bytes
62uclyv.exeuclyv.exe100352 bytes
63beipq.exebeipq.exe169472 bytes
64winlo.exewinlo.exe1220215 bytes
65xoipk.exexoipk.exe142848 bytes
66kory.exekory.exe92672 bytes
67mivi.exemivi.exe171520 bytes
68cajiw.execajiw.exe557056 bytes
69baka6.exebaka6.exe144384 bytes
70ptidle.exeptidle.exe56832 bytes
71pjdeya.exepjdeya.exe597504 bytes
72207163515.exe207163515.exe892416 bytes

Registry Modifications:

The following Registry Keys were created:

  • C:\WINDOWS\System32\kdmsh.exe
  • \VIE5.exe
  • \VIE3.exe
  • Microsoft\Windows NT\CurrentVersion\Winlogon\Notify __c0040F39
  • {4D4DB474-8435-4FA1-8D91-512C0CE1E931}
  • Software\Microsoft\Internet Explorer\Explorer Bars {9CDB6E2A-B859-45BB-8F05-AF684301AB41}
  • Facegame
  • \YUR2D.exe
  • Microsoft\Windows NT\CurrentVersion\Winlogon\Notify nnnkiGvV
  • hlpproc
  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run servises
  • Sys3.exe
  • \YUR2C.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run xqe6lJLnN1
  • \YUR9.exe
  • software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad xokvrpwg
  • \YUR4.exe
  • SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE gi985993737
  • cokx
  • lljyn_df
  • \VIE2F.exe
  • \YURA.exe
  • GetPack19
  • \YURF.exe
  • SOFTWARE\Microsoft\Internet Explorer\Toolbar {57776700-7BC8-47AC-B43E-99C24B015570}
  • SOFTWARE\Microsoft\Internet Explorer\Toolbar {8E21DC20-6E4E-42B3-9796-244EC9385CEF}
  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run andfor
  • Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler {B2BA40A2-74F0-42BD-F434-12345A2C8953}
  • FixCamera
  • \VIE2.exe
  • \YUR6.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad fdxbameg
  • \YUR20.exe
  • Software\Microsoft\Internet Explorer\Explorer Bars {C2EC2654-52F0-3E63-9017-D0FA8FA79271}
  • {0389E53C-62CF-4CD6-9F4E-955A740E4385}
  • %windir%\System32\kdmsh.exe
  • {09E23F2C-ED1E-43FC-9AA1-1332162A35AE}
  • advap32
  • %windir%\System32\kdwls.exe
  • \YUR13.exe
  • software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad tfnslopk
  • \YUR15.exe
  • \YUR12F.exe
  • \YUR3.exe
  • ptidle
  • GetPack21
  • Somefox
  • Sys4.exe
  • Software\Microsoft\Windows\CurrentVersion kdid
  • SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad rwlfsdmk
  • Online Alert Manager
  • Captcha5
  • Microsoft\Windows NT\CurrentVersion\Winlogon\Notify cxqmyibm
  • \YUR2.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad fsrpknov
  • \YUR5.exe
  • SOFTWARE\Microsoft\Internet Explorer\Toolbar {3B4EFB6A-06FD-40AC-B072-1FB7D1D456E8}
  • SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks {D3CCFAF7-DF03-4E73-95EC-E5E139CC2BF2}
  • vmdetdhc.exe
  • Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler {0ba3e00d-b660-46e6-a2db-2672ee82dc98}
  • \YUR131.exe
  • memo site kind that
  • Long Internet Team Stupid
  • ROAD ITCH AMOK PING
  • %windir%\system32\kdswe.exe
  • SmartMon
  • \Win12.exe
  • \Win13.exe
  • {157627A6-2A10-4aa1-B97F-90B8DC6F24AC}
  • \YUR8.exe
  • \YUR1.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks {BB4C402F-882A-4526-8C08-51278EA437C1}
  • \YUR10.exe
  • Cognac
  • \YURE.exe
  • 515.tmp
  • {3BCF8450-D134-427E-AE9C-2A42CE8215CC}
  • Software\Microsoft\Windows\CurrentVersion kdmsh.exe
  • F5JMWNZTHI
  • {78B578D7-BCE1-4d83-9CD4-195BC34D8CB3}
  • Sys2.exe
  • C:\WINDOWS\System32\kdwls.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad xrdwbfgn
  • \VIE14.exe
  • C:\WINDOWS\system32\kdswe.exe
  • Software\Microsoft\Internet Explorer\Explorer Bars {EB9539EB-598E-BCA7-3D4A-82F4F26E9738}
  • \YUR12E.exe
  • \Win10.exe
  • \YURD.exe
  • \YUR2B.exe
  • Sys1.exe
  • Software\Microsoft\Internet Explorer\Explorer Bars {FCDEE81D-95A3-AE8A-D4FB-5A9FB8E32860}
  • \Win14.exe
  • Microsoft\Windows NT\CurrentVersion\Winlogon\Notify ssqPhEVM
  • {E4785213-3EFE-4c26-A9B4-332440E31F6F}
  • Software\Microsoft\Windows\CurrentVersion kdksc.exe
  • \YUR30.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks {C14E6230-757D-4246-81CE-B34E2940C722}
  • \YURC.exe
  • \YURB.exe
  • penis.exe
  • \YUR130.exe
  • bone thunk axis copy
  • BIND SUPPORT SEEK FIRST
  • \YUR14.exe
  • \YUR12.exe
  • \YUR11.exe
  • xydzyh
  • \YUR18.exe
  • SerialsWorld
  • \YUR2A.exe
  • \Win11.exe
  • cont_mxlivemedia

Comments

  1. el programa me detecta las amenazas pero para eliminarlas hay que pagar!!!

Reply

Your email address will not be published.

Name
Website
Comment

Enter the numbers in the box to the right *