Quantcast
Channel: How to Remove Malware
Viewing all articles
Browse latest Browse all 38585

HOSTS-CODEDOWNLOADER.EXE is Trojan Downloader

$
0
0

The file HOSTS-CODEDOWNLOADER.EXE is identified as a virus dropper.
The dropper HOSTS-CODEDOWNLOADER.EXE is used for downloading and installing other malware, Trojans, viruses by the commands received from the Command Center.
The file HOSTS-CODEDOWNLOADER.EXE loads into the computer memory and tries to connect to the dangerous web site.
Usually the HOSTS-CODEDOWNLOADER.EXE dropper does not infect the files on the computer and does not replicate itself on other computers.
Kill the HOSTS-CODEDOWNLOADER.EXE process and delete the file HOSTS-CODEDOWNLOADER.EXE.

Malware Analysis of HOSTS-CODEDOWNLOADER.EXE
Full path on a computer: %PROGRAMFILES%\HOSTS\HOSTS-CODEDOWNLOADER.EXE

Detected by UnHackMe:

HOSTS-CODEDOWNLOADER.EXE
Default location: %PROGRAMFILES%\HOSTS\HOSTS-CODEDOWNLOADER.EXE

Removal Results: Success
Number of reboot: 1

HOSTS-CODEDOWNLOADER.EXE is known as:

Trojan Downloader

How to quickly detect HOSTS-CODEDOWNLOADER.EXE presence?
Files:
  • %APPDATA%\ROAMING\MOZILLA\FIREFOX\PROFILES\ZP7TNB55.DEFAULT\EXTENSIONS\05DD836E-2CBD-4204-9FF3-2F8A8665967D@A8876730-FB0C-4057-A2FC-F9C09D438E81.COM\CHROME\CONTENT\API\ASYNCDB.JS
  • %APPDATA%\ROAMING\MOZILLA\FIREFOX\PROFILES\ZP7TNB55.DEFAULT\EXTENSIONS\05DD836E-2CBD-4204-9FF3-2F8A8665967D@A8876730-FB0C-4057-A2FC-F9C09D438E81.COM\CHROME\CONTENT\API\BROWSERACTION.JS
  • %APPDATA%\ROAMING\MOZILLA\FIREFOX\PROFILES\ZP7TNB55.DEFAULT\EXTENSIONS\05DD836E-2CBD-4204-9FF3-2F8A8665967D@A8876730-FB0C-4057-A2FC-F9C09D438E81.COM\CHROME\CONTENT\API\CONTEXTMENU.JS
  • %APPDATA%\ROAMING\MOZILLA\FIREFOX\PROFILES\ZP7TNB55.DEFAULT\EXTENSIONS\05DD836E-2CBD-4204-9FF3-2F8A8665967D@A8876730-FB0C-4057-A2FC-F9C09D438E81.COM\CHROME\CONTENT\API\FIREFOX.JS
  • %PROGRAMFILES%\HOSTS\HOSTS-CODEDOWNLOADER.EXE


Viewing all articles
Browse latest Browse all 38585

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>