TR/PSW.Magania.dlhj
TR/PSW.Magania.dlhj is a Trojan that spreads via unsolicited e-mails and malicious drive-by downloads. Once inside a system, TR/PSW.Magania.dlhj will harvest confidential data related to online games including usernames and passwords. TR/PSW.Magania.dlhj may also download harmful files onto an infected computer and deteriorate its performance.
File System Details
TR/PSW.Magania.dlhj may create the following file(s):
# | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|
1. | %TEMPDIR%\am.exe | |
2. | %TEMPDIR%\dsoqq0.dll | |
3. | %drive%\g6jk.exe | |
4. | %SYSDIR%\arking.exe | |
5. | %TEMPDIR%\dsoqq.exe | |
6. | %SYSDIR%\arking0.dll | |
7. | %PROGRAM FILES%\Internet Explorer\IEXPLORE.EXE | |
8. | %drive%\autorun.inf | |
9. | %TEMPDIR%\am1.rar |
Registry Details
TR/PSW.Magania.dlhj may create the following registry entry or registry entries:
"dso32"="%TEMPDIR%\dsoqq.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
Folder\Hidden\SHOWALL]
"King_ar"="%SYSDIR%\arking.exe"
"urlinfo"="dfxsri.i"
"ShowSuperHidden"=dword:0x00000000
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
[HKLM\SOFTWARE\Classes\CLSID\MADOWN]
"Hidden"=dword:0x00000002
"NoDriveTypeAutoRun"=dword:0x00000091
"CheckedValue"=dword:0x00000000
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.