Threat Database Trojans Trojan.Generic

Trojan.Generic

By CagedTech in Trojans

Threat Scorecard

Ranking: 178
Threat Level: 90 % (High)
Infected Computers: 730,250
First Seen: July 24, 2009
Last Seen: April 23, 2024
OS(es) Affected: Windows

Trojan.Generic is a detection used by anti-malware utilities to inform users if there are Trojans on their computers. The Trojan.Generic detection may be used to identify more than one threat, so it isn't impossible to offer you detailed information about the dangers that threats detected as 'Trojan.Generic' may hide. However, it goes without saying that this detection is used to describe threatening Trojans that may be used to download additional threats to the targeted computer, as well as to execute other unsafe operations that may put the infected machine in danger. Trojan.Generic infections are spread with the help of a broad range of threat distribution techniques, and that's why users must make sure always to have their computer protected by a reputable anti-malware utility.

One method that con artists may use to spread Trojans is e-mail spam. The evil-minded people behind Trojan distribution campaigns may send thousands of misleading e-mail messages containing false information whose purpose is to trick users into downloading and executing a corrupted file that might be disguised to look like a legitimate document, image or other common files. The best way to avoid threatening files that may be associated with Trojan.Generic is to restrain from opening e-mail messages from unknown senders, as well as to be more careful while browsing the Web or downloading files hosted on less popular websites. Naturally, the best protection from Trojan.Generic is installing a trustworthy and up-to-date anti-virus product that can stop the infection before causing any damage.

Aliases

15 security vendors flagged this file as malicious.

Anti-Virus Software Detection
AVG Generic.A6F
Fortinet Adware/Amonetize
Panda PUP/Multitoolbar
GData Win32.Application.Agent.ORYHPJ
AhnLab-V3 PUP/Win32.Amonetize
Antiy-AVL GrayWare[AdWare:not-a-virus]/Win32.Amonetize
Sophos Generic PUA GL (PUA)
McAfee-GW-Edition Artemis!PUP
TrendMicro TROJ_GEN.R047C0OK415
DrWeb Trojan.Amonetize.10283
Kaspersky not-a-virus:AdWare.Win32.Amonetize.btms
Symantec PUA.SwVersionUpdater
McAfee Artemis!E3B45AB10134
Panda Generic Suspicious
AVG PSW.Generic12.CIMP

SpyHunter Detects & Remove Trojan.Generic

File System Details

Trojan.Generic may create the following file(s):
# File Name MD5 Detections
1. 2274007.exe c0c058b51003cafcf8c0315769aec7a1 545
2. wkou.exe b709493d37e9ffb67aff1c3dfc9b2706 126
3. network.exe 8e9b90a20a604013e37ebf0806025e06 31
4. 458b8b62a3dea11f18a4ead71770dcba0d18a367955bd4f82413e28f53c3339e 45aa1d943161c988f7391b0cad4e2b89 9
5. 87cf63728ccbd48ba914f6f5a95ce0a902c76e5fc74ba4ab3e5218eec403ada4 73047a5697ecefcaba722286acc12c2a 9
6. 7518b32bd790d697357b740cd3aa76ca77d5fd3ede391124519dbd55874ce2d0 2a5a512f3c04262a34762e23daf5c47b 8
7. aee23d72e06c96f0b7fb6ee985bddff6f13986b67918f9bc9997f6c921b4b8e4.exe 9563838c069be84370d547120ed35316 7
8. RemoteAppLifetimeManager.exe de1465236e152ea854a10d1cb1f9aa62 5
9. 5178316a133ee4ce629f5b31ddc2fdb8fd6ff8a581174c0a21f41d44ebfcd88d.exe 2dbfc31d570c7db069024f30fd16af19 5
10. 73010e37fc4f4cd571c70b6e98560bdf342e3ca9364fd699c1d63611fcf4311e.exe d126669244f967af96759da5417d4884 5
11. 756573b42896abe1b44357b47902252a845fe567e1fdc056939f2fa206dd2189.exe b14ee20b9f6cb4e6600de451f83e8d3a 5
12. a72d19bc0c550d6ac3e8e6ef34bf507091219e72091a76bb7d1950848d4837b7.exe 441d11556e98852e9cd720a2a04e4b74 5
13. aecbe7bff2da0caa0649ec01488a1a836b2c638a824bba67b78ad50fb137d7be.exe dd4ad6e90dfc9496cb56150376a6c181 5
14. b625d3a356f627b81becdfc0945396da37e762a3bae3462bd59b625fb6d091aa.exe ed4df0ef06520be7da64261107f0f527 5
15. cc883d294c58d5b061c9754bf4c8a69f34609c62a609cd5a3922fdcb90957fcc.exe 035d53ac51763375f50876494bb80d86 5
16. d16f873e2941fb953e381f4bcf8bcb347bfa1125efa06c71706e02c960717213.exe f8c9cb4c4898e077e4454d510f3bca11 5
17. d19e690275e1eec487544552366accd109567893c79b3634cef31515b9a0a19b.exe 586fa8fea2272a93224d52ea5c32c331 5
18. fa67c0d0bac1f60c00b103773d7dba352956dc4db285f13e266a03ab46796b04.exe e60f2ae7d0109364e0a18bb7a5dc4a03 5
19. fafa6767621f62637d1baf9a44c160eecef66481beabde38b2a87bdd0b1b161a.exe ef2bd3821b7ff576ad7a213d5e819a0d 5
20. 2629ac8299cad363747c43caf52dd46d0267fa40ef1b95ce7f316668ec23055b ab42ffcbd0f9e3d761af81bb31e8eb7d 4
21. cfce0479f252d8a37a069a9cb0e514593dea1dba7888d8b81212d2c594b44cba ac4a0fc175f0210e60a9aa04cef7501c 2
22. f15a3417501358c054990f42cc96dd6fc1677fbef3a87d0dc36b18b2f583cfa5 7b5f22804e53f0ee5dd6f49343253725 2
More files

Registry Details

Trojan.Generic may create the following registry entry or registry entries:
CLSID
{00011268-E188-40DF-A514-835FCD78B1BF}
{038cb5c7-48ea-4af9-94e0-a1646542e62b}
{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}
{9233C3C0-1472-4091-A505-5580A23BB4AC}
{AFD4AD01-58C1-47DB-A404-FBE00A6C5486}
{BB4C402F-882A-4526-8C08-51278EA437C1}
{BB4C402F-882A-8C08-4526-51278EA437C1}
File name without path
_file_!.tmp
Adobe!.exe
bazoulla.exe
cccam.vbs
dowloadx.exe
Exit To Dos.pif
ifhvvyy.exe
kissq.exe
loader.vbs
NYANxCAT.vbs
QUALITY PORN.url
QuicTime.EXE
searzar.exe
svchost.vbs
svchostw.exe
svcnosts.exe
tempsystem32bit.exe
Twitchilych.exe
windows.gaming.xboxlive.storage.exe
winnewsserv.exe
worm.vbs
Regexp file mask
%ALLUSERSPROFILE%\Application Data\Console.exe
%allusersprofile%\application data\keygen.bat
%ALLUSERSPROFILE%\Application Data\run.exe
%ALLUSERSPROFILE%\Application Data\WorkflowAppControl.exe
%ALLUSERSPROFILE%\Console.exe
%ALLUSERSPROFILE%\cpsvchost.exe
%ALLUSERSPROFILE%\des.exe
%ALLUSERSPROFILE%\dllhost.exe
%ALLUSERSPROFILE%\ggse.exe
%allusersprofile%\keygen.bat
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\startup\[RANDOM CHARACTERS].pif
%ALLUSERSPROFILE%\NvContainer.exe
%allusersprofile%\qspeak.dll
%ALLUSERSPROFILE%\run.exe
%ALLUSERSPROFILE%\Service.exe
%ALLUSERSPROFILE%\start.exe
%allusersprofile%\sv[RANDOM CHARACTERS]ost.exe
%ALLUSERSPROFILE%\svshost.exe
%ALLUSERSPROFILE%\WorkflowAppControl.exe
%ALLUSERSPROFILE%\worm.exe
%APPDATA%\[NUMBERS].exe
%APPDATA%\AMonitor\w{0,1}comspc.exe
%APPDATA%\app.exe
%appdata%\backdays.exe
%APPDATA%\BBCC.exe
%APPDATA%\Certificates\sixhost.exe
%APPDATA%\Chromm.exe
%APPDATA%\Cousins
%APPDATA%\csrssw{0,4}.exe
%APPDATA%\explorer.exe
%APPDATA%\fix.exe
%APPDATA%\FolderN\name.exe
%APPDATA%\Google Auto Updater.exe
%APPDATA%\images.exe
%appdata%\images\img.exe
%appdata%\jjj.exe
%APPDATA%\jusched121.exe
%appdata%\kerorerohek.exe
%APPDATA%\load[RANDOM CHARACTERS].exe
%APPDATA%\loader.exe
%APPDATA%\logger.p
%APPDATA%\LogMeInUpdService\logmeinusvc.exe
%APPDATA%\Media Center Programs\update.exe
%APPDATA%\Microsoft\Authawex\dssetLib.exe
%APPDATA%\microsoft\security\security helper.exe
%APPDATA%\Microsoft\Windows\dwm.exe
%APPDATA%\Microsoft\Windows\Sound.exe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\app.exe
%APPDATA%\microsoft\windows\start menu\programs\startup\111.exe
%APPDATA%\microsoft\windows\start menu\programs\startup\[RANDOM CHARACTERS].pif
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\[RANDOM CHARACTERS]ame.vbs
%appdata%\microsoft\windows\start menu\programs\startup\[RANDOM CHARACTERS]payload[RANDOM CHARACTERS].exe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\AdobeDll.exe
%appdata%\microsoft\windows\start menu\programs\startup\cwds.exe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe
%appdata%\microsoft\windows\start menu\programs\startup\mscv[NUMBERS].exe
%appdata%\microsoft\windows\start menu\programs\startup\runpe.exe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.vbs
%appdata%\microsoft\windows\start menu\programs\startup\startab.vbs
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\SystemAutorun.exe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\usvc32.lnk
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\virus.exe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Windows Security Update.exe
%APPDATA%\Microsoft\Windows\Stealer.exe
%APPDATA%\Microsoft\Windows\Templates\System.Dll.Exe
%APPDATA%\MSBUILD.exe
%appdata%\netflix.exe
%APPDATA%\omsecor.exe
%APPDATA%\PR_Updaters_Service.exe
%APPDATA%\puddlings.exe
%APPDATA%\qop.exe
%APPDATA%\RSSCom\SCG.exe
%APPDATA%\scvhost.exe
%APPDATA%\smss.exe
%APPDATA%\sumuel.exe
%APPDATA%\taskger.exe
%APPDATA%\taskkor.exe
%appdata%\tbgrvfcer.exe
%APPDATA%\update.exe
%APPDATA%\van.exe
%APPDATA%\xpsr[RANDOM CHARACTERS].exe
%APPDATA%\zero.exe
%HOMEDRIVE%\dllhost.exe
%HOMEDRIVE%\IMG001.exe
%LOCALAPPDATA%\adobe.exe
%localappdata%\firefox utility.exe
%localappdata%\idlsvcs\idlsvcs.exe
%LOCALAPPDATA%\Local Settings.exe
%LOCALAPPDATA%\micro\micro.dll
%LOCALAPPDATA%\Microsoft\WUDHost.exe
%LOCALAPPDATA%\svchost.exe
%localappdata%\svx.exe
%LOCALAPPDATA%\temp\trojan.exe
%localappdata%\temploader.exe
%LOCALAPPDATA%\Temptilusorel.exe
%localappdata%\winrar.exe
%ProgramFiles%\phc?????????\[RANDOM CHARACTERS]
%ProgramFiles%\rhc?????????\[RANDOM CHARACTERS]
%ProgramFiles%\thc?????????\[RANDOM CHARACTERS]
%ProgramFiles%\thc[RANDOM CHARACTERS].[RANDOM CHARACTERS]
%ProgramFiles%\whc[RANDOM CHARACTERS].[RANDOM CHARACTERS]
%SYSTEMDRIVE%\escaped.exe
%SystemRoot%\System32\lphc[RANDOM CHARACTERS].[RANDOM CHARACTERS]
%SystemRoot%\System32\phc[RANDOM CHARACTERS].[RANDOM CHARACTERS]
%SystemRoot%\System32\rhc[RANDOM CHARACTERS].[RANDOM CHARACTERS]
%SystemRoot%\System32\thc[RANDOM CHARACTERS].[RANDOM CHARACTERS]
%SystemRoot%\System32\whc[RANDOM CHARACTERS].[RANDOM CHARACTERS]
%TEMP%\[NUMBERS].exe
%TEMP%\hey.exe
%TEMP%\IELOGIN.abc
%TEMP%\Microsft.exe
%TEMP%\mine.exe
%TEMP%\moving.txt
%TEMP%\name.exe
%TEMP%\server2.exe
%TEMP%\systemWow64.exe
%TEMP%\test[1].exe
%TEMP%\wininetsvc.exe
%TEMP%\xxx[RANDOM CHARACTERS].exe
%UserProfile%\643f[RANDOM CHARACTERS].[RANDOM CHARACTERS]
%USERPROFILE%\Desktop\firefoxe.exe
%userprofile%\documents\app.exe
%USERPROFILE%\Documents\LeaderTask\ltask.exe
%USERPROFILE%\Downloads\KEYS?.exe[RANDOM CHARACTERS]
%USERPROFILE%\Downloads\Order[NUMBERS].exe
%USERPROFILE%\Downloads\pady.exe
%USERPROFILE%\Downloads\scar.exe
%USERPROFILE%\Local Settings\Application Data\svchost.exe
%USERPROFILE%\Music\Disney\aiming.exe
%USERPROFILE%\NVDisplay.Container.exe
%UserProfile%\phc[RANDOM CHARACTERS].[RANDOM CHARACTERS]
%UserProfile%\rhc[RANDOM CHARACTERS].[RANDOM CHARACTERS]
%userprofile%\rrinstaller\RtlUpd64.exe
%USERPROFILE%\taswexuahoft.exe
%UserProfile%\thc[RANDOM CHARACTERS].[RANDOM CHARACTERS]
%USERPROFILE%\Update\Updater[RANDOM CHARACTERS].exe
%USERPROFILE%\user.exe
%UserProfile%\whc[RANDOM CHARACTERS].[RANDOM CHARACTERS]
%USERPROFILE%\windows\svchost.com
%WINDIR%\assembly\w{1,15}.exe
%WINDIR%\configuration\configuration.exe
%WINDIR%\CTS.exe
%WINDIR%\debug\cmghost.exe
%WINDIR%\debug\item.dat
%WINDIR%\debug\ok.dat
%WINDIR%\Defender.exe
%WINDIR%\Fonts\sqlserver.exe
%WINDIR%\Max\maxup.exe
%WINDIR%\Max\sammui.exe
%WINDIR%\Max\wincore.exe
%windir%\svchost.exe.exe
%WINDIR%\System32\seth.exe
%WINDIR%\System32\Tasks\At1
%WINDIR%\System32\Tasks\Peoria
%WINDIR%\System32\workout.exe
%WINDIR%\SysWOW64\Microsoft\crrcs.exe
%WINDIR%\SysWOW64\mqls.exe
%WINDIR%\SysWOW64\seth.exe
%WINDIR%\Tasks\At1.job
%WINDIR%\Tasks\At[NUMBERS].job
%WINDIR%\userinit.exe
%WINDIR%\windows.bat
%WINDIR%\windows.vbs
%WINDIR%\Windows\ProgramData\svchost.exe
%WINDIR%\Windows\ProgramData\wincore.exe
Software\Microsoft\Windows\CurrentVersion\##
Software\Microsoft\Windows\CurrentVersion\Run\5725c62dbe5ccceaeca7741be17a45b5
Software\Microsoft\Windows\CurrentVersion\Run\Google Helper 2
SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Regedit32
SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.vbs
Software\Microsoft\Windows\CurrentVersion\Run\Windows Update
SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Update
SOFTWARE\vítima
SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5725c62dbe5ccceaeca7741be17a45b5
SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Regedit32
Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update
SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Windows Update
SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{4826EBDF-CA2E-40D0-8CD8-1D7C1603E46F}
SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{7A67B53B-F94B-4D5B-A554-0817C58A3ABA}
SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{4826EBDF-CA2E-40D0-8CD8-1D7C1603E46F}
SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{7A67B53B-F94B-4D5B-A554-0817C58A3ABA}
SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{4826EBDF-CA2E-40D0-8CD8-1D7C1603E46F}
SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{7A67B53B-F94B-4D5B-A554-0817C58A3ABA}
Run keys
Cognac
FixCamera
SmartMon

Directories

Trojan.Generic may create the following directory or directories:

%ALLUSERSPROFILE%\Application Data\google helper 2
%ALLUSERSPROFILE%\HDD Integrity Checker
%ALLUSERSPROFILE%\Java Update Controller
%ALLUSERSPROFILE%\Orihoni
%ALLUSERSPROFILE%\VagJelr
%ALLUSERSPROFILE%\application data\services
%ALLUSERSPROFILE%\google helper 2
%ALLUSERSPROFILE%\services
%ALLUSERSPROFILE%\windows host
%ALLUSERSPROFILE%\windows security
%APPDATA%\Adobe\SWF Frame Renderer
%APPDATA%\Imminent\Logs
%APPDATA%\Micrososft\infin
%APPDATA%\NvidiaAdapter
%APPDATA%\Systemrc
%APPDATA%\Windows Updates Files
%APPDATA%\XReg32
%APPDATA%\ZSmsWin
%APPDATA%\abode
%APPDATA%\dclogs
%APPDATA%\lime
%APPDATA%\wnetworkmgmt
%COMMONPROGRAMFILES(x86)%\sfbsbvy
%HOMEDRIVE%\UsbFixer
%HOMEDRIVE%\skycloudtemp
%LOCALAPPDATA%\Michael
%LOCALAPPDATA%\syshealth
%PROGRAMFILES%\CompanyExpertChange
%PROGRAMFILES%\acoustic talk
%PROGRAMFILES%\data_up
%PROGRAMFILES%\labelwoka
%PROGRAMFILES%\memory cafe
%PROGRAMFILES%\xyrz
%PROGRAMFILES(x86)%\CompanyExpertChange
%PROGRAMFILES(x86)%\data_up
%PROGRAMFILES(x86)%\microsoft games\game
%PROGRAMFILES(x86)%\microsoft games\games
%PROGRAMFILES(x86)%\subdir
%TEMP%\FoldfoerN
%TEMP%\MyOtApp
%TEMP%\Subvon
%TEMP%\avas32
%TEMP%\get_away_from_me
%USERPROFILE%\videos\captures\news
%WINDIR%\System32\System32
%allusersprofile%\VkontakateDJ
%appdata%\appnt
%appdata%\baocv
%appdata%\bssvchost
%localappdata%\windowssvnc
%programfiles%\EyeDetaca
%programfiles%\MinuteBapivi
%programfiles%\MoneyKigaha
%programfiles%\copa
%programfiles%\doper
%programfiles%\fufo
%programfiles(x86)%\copa
%programfiles(x86)%\doper
%programfiles(x86)%\fufo
%temp%\wup
%windir%\fonts\xxx

Related Posts

Trending

Most Viewed

Loading...