I recommend you UnHackMe - Ultimate Malware Killer for fast malware removal:
Free DownloadFully Functional 30-day Trial. No credit card is required.
Reviews. EULA. Privacy Policy. Uninstall.
RUNDLL32.EXE – Trojan Agent removal
File | MD5 | Virus Alias |
---|---|---|
RUNDLL32.EXE | 78c91ff0d9cce1e4c993dc2628ccbb5b | Trojan Agent |
RUNDLL32.EXE | 78c91ff0d9cce1e4c993dc2628ccbb5b | Trojan SuspiciousFile |
RUNDLL32.EXE | 78c91ff0d9cce1e4c993dc2628ccbb5b | Trojan Generic |
RUNDLL32.EXE | 78c91ff0d9cce1e4c993dc2628ccbb5b | Trojan FakeAV |
RUNDLL32.EXE size: 166912 bytes
RUNDLL32.EXE hash: 78C91FF0D9CCE1E4C993DC2628CCBB5B
Created files:
%Local AppData%\FlashContainer\bin\bfg32\backtrace.dll
%Local AppData%\FlashContainer\bin\bfg32\bfgminer-rpc.exe
%Local AppData%\FlashContainer\bin\bfg32\bfgminer.exe
%Local AppData%\FlashContainer\bin\bfg32\libblkmaker-0.1-0.dll
%Local AppData%\FlashContainer\bin\bfg32\libblkmaker_jansson-0.1-0.dll
%Local AppData%\FlashContainer\bin\bfg32\libcurl-4.dll
%Local AppData%\FlashContainer\bin\bfg32\libjansson-4.dll
%Local AppData%\FlashContainer\bin\bfg32\libusb-1.0.dll
%Local AppData%\FlashContainer\bin\bfg32\pdcurses.dll
%Local AppData%\FlashContainer\bin\bfg32\pthreadGC2.dll
%Local AppData%\FlashContainer\bin\bfg32\scrypt130511.cl
%Local AppData%\FlashContainer\bin\bfg32\zlib1.dll
%Local AppData%\FlashContainer\bin\bfg64\backtrace.dll
%Local AppData%\FlashContainer\bin\bfg64\bfgminer-rpc.exe
%Local AppData%\FlashContainer\bin\bfg64\bfgminer.exe
%Local AppData%\FlashContainer\bin\bfg64\libblkmaker-0.1-0.dll
%Local AppData%\FlashContainer\bin\bfg64\libblkmaker_jansson-0.1-0.dll
%Local AppData%\FlashContainer\bin\bfg64\libcurl-4.dll
%Local AppData%\FlashContainer\bin\bfg64\libjansson-4.dll
%Local AppData%\FlashContainer\bin\bfg64\libusb-1.0.dll
%Local AppData%\FlashContainer\bin\bfg64\pdcurses.dll
%Local AppData%\FlashContainer\bin\bfg64\pthreadGC2.dll
%Local AppData%\FlashContainer\bin\bfg64\scrypt130511.cl
%Local AppData%\FlashContainer\bin\bfg64\zlib1.dll
%Local AppData%\FlashContainer\bin\miderd\libcurl-4.dll
%Local AppData%\FlashContainer\bin\miderd\minerd.exe
%Local AppData%\FlashContainer\bin\miderd\pthreadGC2.dll
%Local AppData%\FlashContainer\bin\miderd\zlib1.dll
%Local AppData%\FlashContainer\dll\hookdll.dll
%Local AppData%\FlashContainer\dll\hookdll64.dll
%Local AppData%\FlashContainer\rundll32.exe
%Local AppData%\FlashContainer\taskhost.exe
Autostart registry keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host Process: “%WinDir%\System32\config\Systemprofile\Local Settings\Application Data\FlashContainer\rundll32.exe”
Detected by UnHackMe:
RUNDLL32.EXE
Default location: %LOCAL APPDATA%\FLASHCONTAINER\RUNDLL32.EXE
Dropper information:
MD5: 91c3f1af251700059b0ce11a6637d34e
File size: 2303488 bytes