Categories: Trojan,Adware,Backdoor,Downloader
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.
[Eset]Win32/VB.NB trojan,Win32/VB.NB1 trojan;
[Panda]Adware/MemoryWatcher;
[Computer Associates]Win32.Memwatch.B,Win32/Raquad.B!Trojan,Win32.Memwatch.D,Win32.Memwatch.E,Win32/Memwatch.D!Trojan,Win32/Memwatch.E!Trojan,Win32.Memwatch.C,Win32.Memwatch.A
Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\memorywatcher_b.exe
[%WINDOWS%]\emsw.exe
[%PROGRAM_FILES%]\memorywatcher.exe
[%SYSTEM%]\aaf85h.exe
[%SYSTEM%]\atv0h.exe
[%SYSTEM%]\auhgfah.exe
[%SYSTEM%]\bfu3.exe
[%SYSTEM%]\coub.exe
[%SYSTEM%]\cxe0o.exe
[%SYSTEM%]\dkp0h.exe
[%SYSTEM%]\dmfok.exe
[%SYSTEM%]\dsz3fao2.exe
[%SYSTEM%]\eah1q5.exe
[%SYSTEM%]\ekq0h.exe
[%SYSTEM%]\engpl.exe
[%SYSTEM%]\fdst0kpr.exe
[%SYSTEM%]\fmd2nj.exe
[%SYSTEM%]\gbi1r6.exe
[%SYSTEM%]\gdnhxa.exe
[%SYSTEM%]\hcj2s6.exe
[%SYSTEM%]\hnnygk7f.exe
[%SYSTEM%]\idk277.exe
[%SYSTEM%]\ihkc.exe
[%SYSTEM%]\inl641ww.exe
[%SYSTEM%]\iry3r.exe
[%SYSTEM%]\iux1va1z.exe
[%SYSTEM%]\jqvgne.exe
[%SYSTEM%]\kfmj8u3.exe
[%SYSTEM%]\khcwyng.exe
[%SYSTEM%]\lsxi5g.exe
[%SYSTEM%]\mcl7.exe
[%SYSTEM%]\mhok9w3.exe
[%SYSTEM%]\mxe42m.exe
[%SYSTEM%]\ncisp.exe
[%SYSTEM%]\ngioueb1.exe
[%SYSTEM%]\nipl9x4.exe
[%SYSTEM%]\nuzk63g.exe
[%SYSTEM%]\opulcwn3.exe
[%SYSTEM%]\pnkdb03.exe
[%SYSTEM%]\pnzzd.exe
[%SYSTEM%]\qbk7x.exe
[%SYSTEM%]\qjff4.exe
[%SYSTEM%]\qlso0a55.exe
[%SYSTEM%]\qvsy6.exe
[%SYSTEM%]\rpbbf5.exe
[%SYSTEM%]\rydo84km.exe
[%SYSTEM%]\sdelh.exe
[%SYSTEM%]\sgr88me.exe
[%SYSTEM%]\snd2c.exe
[%SYSTEM%]\subsuq.exe
[%SYSTEM%]\tarv.exe
[%SYSTEM%]\upws.exe
[%SYSTEM%]\vchsyjo.exe
[%SYSTEM%]\vuf23s1.exe
[%SYSTEM%]\vwsi.exe
[%SYSTEM%]\wprx.exe
[%SYSTEM%]\wyrgmw.exe
[%SYSTEM%]\xtgcu7.exe
[%SYSTEM%]\zhrcofz.exe
[%SYSTEM%]\zvbyl.exe
[%SYSTEM%]\zyj35w3.exe
[%WINDOWS%]\system\flsla.exe
[%WINDOWS%]\system\jxzw8.exe
[%WINDOWS%]\system\mxy2.exe
[%WINDOWS%]\system\nauzjgh.exe
[%WINDOWS%]\system\vqxt.exe
[%WINDOWS%]\system\xdkd.exe
[%WINDOWS%]\temp\memorywatcher_b.exe
[%PROFILE_TEMP%]\memorywatcher_b.exe
[%WINDOWS%]\emsw.exe
[%PROGRAM_FILES%]\memorywatcher.exe
[%SYSTEM%]\aaf85h.exe
[%SYSTEM%]\atv0h.exe
[%SYSTEM%]\auhgfah.exe
[%SYSTEM%]\bfu3.exe
[%SYSTEM%]\coub.exe
[%SYSTEM%]\cxe0o.exe
[%SYSTEM%]\dkp0h.exe
[%SYSTEM%]\dmfok.exe
[%SYSTEM%]\dsz3fao2.exe
[%SYSTEM%]\eah1q5.exe
[%SYSTEM%]\ekq0h.exe
[%SYSTEM%]\engpl.exe
[%SYSTEM%]\fdst0kpr.exe
[%SYSTEM%]\fmd2nj.exe
[%SYSTEM%]\gbi1r6.exe
[%SYSTEM%]\gdnhxa.exe
[%SYSTEM%]\hcj2s6.exe
[%SYSTEM%]\hnnygk7f.exe
[%SYSTEM%]\idk277.exe
[%SYSTEM%]\ihkc.exe
[%SYSTEM%]\inl641ww.exe
[%SYSTEM%]\iry3r.exe
[%SYSTEM%]\iux1va1z.exe
[%SYSTEM%]\jqvgne.exe
[%SYSTEM%]\kfmj8u3.exe
[%SYSTEM%]\khcwyng.exe
[%SYSTEM%]\lsxi5g.exe
[%SYSTEM%]\mcl7.exe
[%SYSTEM%]\mhok9w3.exe
[%SYSTEM%]\mxe42m.exe
[%SYSTEM%]\ncisp.exe
[%SYSTEM%]\ngioueb1.exe
[%SYSTEM%]\nipl9x4.exe
[%SYSTEM%]\nuzk63g.exe
[%SYSTEM%]\opulcwn3.exe
[%SYSTEM%]\pnkdb03.exe
[%SYSTEM%]\pnzzd.exe
[%SYSTEM%]\qbk7x.exe
[%SYSTEM%]\qjff4.exe
[%SYSTEM%]\qlso0a55.exe
[%SYSTEM%]\qvsy6.exe
[%SYSTEM%]\rpbbf5.exe
[%SYSTEM%]\rydo84km.exe
[%SYSTEM%]\sdelh.exe
[%SYSTEM%]\sgr88me.exe
[%SYSTEM%]\snd2c.exe
[%SYSTEM%]\subsuq.exe
[%SYSTEM%]\tarv.exe
[%SYSTEM%]\upws.exe
[%SYSTEM%]\vchsyjo.exe
[%SYSTEM%]\vuf23s1.exe
[%SYSTEM%]\vwsi.exe
[%SYSTEM%]\wprx.exe
[%SYSTEM%]\wyrgmw.exe
[%SYSTEM%]\xtgcu7.exe
[%SYSTEM%]\zhrcofz.exe
[%SYSTEM%]\zvbyl.exe
[%SYSTEM%]\zyj35w3.exe
[%WINDOWS%]\system\flsla.exe
[%WINDOWS%]\system\jxzw8.exe
[%WINDOWS%]\system\mxy2.exe
[%WINDOWS%]\system\nauzjgh.exe
[%WINDOWS%]\system\vqxt.exe
[%WINDOWS%]\system\xdkd.exe
[%WINDOWS%]\temp\memorywatcher_b.exe
How to detect Memwatch:
Files:
[%PROFILE_TEMP%]\memorywatcher_b.exe
[%WINDOWS%]\emsw.exe
[%PROGRAM_FILES%]\memorywatcher.exe
[%SYSTEM%]\aaf85h.exe
[%SYSTEM%]\atv0h.exe
[%SYSTEM%]\auhgfah.exe
[%SYSTEM%]\bfu3.exe
[%SYSTEM%]\coub.exe
[%SYSTEM%]\cxe0o.exe
[%SYSTEM%]\dkp0h.exe
[%SYSTEM%]\dmfok.exe
[%SYSTEM%]\dsz3fao2.exe
[%SYSTEM%]\eah1q5.exe
[%SYSTEM%]\ekq0h.exe
[%SYSTEM%]\engpl.exe
[%SYSTEM%]\fdst0kpr.exe
[%SYSTEM%]\fmd2nj.exe
[%SYSTEM%]\gbi1r6.exe
[%SYSTEM%]\gdnhxa.exe
[%SYSTEM%]\hcj2s6.exe
[%SYSTEM%]\hnnygk7f.exe
[%SYSTEM%]\idk277.exe
[%SYSTEM%]\ihkc.exe
[%SYSTEM%]\inl641ww.exe
[%SYSTEM%]\iry3r.exe
[%SYSTEM%]\iux1va1z.exe
[%SYSTEM%]\jqvgne.exe
[%SYSTEM%]\kfmj8u3.exe
[%SYSTEM%]\khcwyng.exe
[%SYSTEM%]\lsxi5g.exe
[%SYSTEM%]\mcl7.exe
[%SYSTEM%]\mhok9w3.exe
[%SYSTEM%]\mxe42m.exe
[%SYSTEM%]\ncisp.exe
[%SYSTEM%]\ngioueb1.exe
[%SYSTEM%]\nipl9x4.exe
[%SYSTEM%]\nuzk63g.exe
[%SYSTEM%]\opulcwn3.exe
[%SYSTEM%]\pnkdb03.exe
[%SYSTEM%]\pnzzd.exe
[%SYSTEM%]\qbk7x.exe
[%SYSTEM%]\qjff4.exe
[%SYSTEM%]\qlso0a55.exe
[%SYSTEM%]\qvsy6.exe
[%SYSTEM%]\rpbbf5.exe
[%SYSTEM%]\rydo84km.exe
[%SYSTEM%]\sdelh.exe
[%SYSTEM%]\sgr88me.exe
[%SYSTEM%]\snd2c.exe
[%SYSTEM%]\subsuq.exe
[%SYSTEM%]\tarv.exe
[%SYSTEM%]\upws.exe
[%SYSTEM%]\vchsyjo.exe
[%SYSTEM%]\vuf23s1.exe
[%SYSTEM%]\vwsi.exe
[%SYSTEM%]\wprx.exe
[%SYSTEM%]\wyrgmw.exe
[%SYSTEM%]\xtgcu7.exe
[%SYSTEM%]\zhrcofz.exe
[%SYSTEM%]\zvbyl.exe
[%SYSTEM%]\zyj35w3.exe
[%WINDOWS%]\system\flsla.exe
[%WINDOWS%]\system\jxzw8.exe
[%WINDOWS%]\system\mxy2.exe
[%WINDOWS%]\system\nauzjgh.exe
[%WINDOWS%]\system\vqxt.exe
[%WINDOWS%]\system\xdkd.exe
[%WINDOWS%]\temp\memorywatcher_b.exe
[%PROFILE_TEMP%]\memorywatcher_b.exe
[%WINDOWS%]\emsw.exe
[%PROGRAM_FILES%]\memorywatcher.exe
[%SYSTEM%]\aaf85h.exe
[%SYSTEM%]\atv0h.exe
[%SYSTEM%]\auhgfah.exe
[%SYSTEM%]\bfu3.exe
[%SYSTEM%]\coub.exe
[%SYSTEM%]\cxe0o.exe
[%SYSTEM%]\dkp0h.exe
[%SYSTEM%]\dmfok.exe
[%SYSTEM%]\dsz3fao2.exe
[%SYSTEM%]\eah1q5.exe
[%SYSTEM%]\ekq0h.exe
[%SYSTEM%]\engpl.exe
[%SYSTEM%]\fdst0kpr.exe
[%SYSTEM%]\fmd2nj.exe
[%SYSTEM%]\gbi1r6.exe
[%SYSTEM%]\gdnhxa.exe
[%SYSTEM%]\hcj2s6.exe
[%SYSTEM%]\hnnygk7f.exe
[%SYSTEM%]\idk277.exe
[%SYSTEM%]\ihkc.exe
[%SYSTEM%]\inl641ww.exe
[%SYSTEM%]\iry3r.exe
[%SYSTEM%]\iux1va1z.exe
[%SYSTEM%]\jqvgne.exe
[%SYSTEM%]\kfmj8u3.exe
[%SYSTEM%]\khcwyng.exe
[%SYSTEM%]\lsxi5g.exe
[%SYSTEM%]\mcl7.exe
[%SYSTEM%]\mhok9w3.exe
[%SYSTEM%]\mxe42m.exe
[%SYSTEM%]\ncisp.exe
[%SYSTEM%]\ngioueb1.exe
[%SYSTEM%]\nipl9x4.exe
[%SYSTEM%]\nuzk63g.exe
[%SYSTEM%]\opulcwn3.exe
[%SYSTEM%]\pnkdb03.exe
[%SYSTEM%]\pnzzd.exe
[%SYSTEM%]\qbk7x.exe
[%SYSTEM%]\qjff4.exe
[%SYSTEM%]\qlso0a55.exe
[%SYSTEM%]\qvsy6.exe
[%SYSTEM%]\rpbbf5.exe
[%SYSTEM%]\rydo84km.exe
[%SYSTEM%]\sdelh.exe
[%SYSTEM%]\sgr88me.exe
[%SYSTEM%]\snd2c.exe
[%SYSTEM%]\subsuq.exe
[%SYSTEM%]\tarv.exe
[%SYSTEM%]\upws.exe
[%SYSTEM%]\vchsyjo.exe
[%SYSTEM%]\vuf23s1.exe
[%SYSTEM%]\vwsi.exe
[%SYSTEM%]\wprx.exe
[%SYSTEM%]\wyrgmw.exe
[%SYSTEM%]\xtgcu7.exe
[%SYSTEM%]\zhrcofz.exe
[%SYSTEM%]\zvbyl.exe
[%SYSTEM%]\zyj35w3.exe
[%WINDOWS%]\system\flsla.exe
[%WINDOWS%]\system\jxzw8.exe
[%WINDOWS%]\system\mxy2.exe
[%WINDOWS%]\system\nauzjgh.exe
[%WINDOWS%]\system\vqxt.exe
[%WINDOWS%]\system\xdkd.exe
[%WINDOWS%]\temp\memorywatcher_b.exe
Folders:
[%PROGRAM_FILES%]\memorywatcher
Registry Keys:
HKEY_LOCAL_MACHINE\software\memorywatcher
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\memorywatcher
Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\2qcn@364d3eekk
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\46cq6434r8hj77
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
Removing Memwatch:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
Pigeon.ESN Trojan Information
HidePE Trojan Symptoms
Pigeon.AVIZ Trojan Symptoms
Snort.Ids.Trinoo DoS Removal instruction
No comments:
Post a Comment