Main Menu
Contact Us

Unclassified.Spyware.43 Spyware Information

Name: Unclassified.Spyware.43
Category: Spyware
Alias: - Alias: LocalNRD
Advice: Remove
Risk: Elevated Risk Elevated threats are usually threats that fall into the range of adware in which data about a user's habits are tracked and sent back to a server for analysis without your consent or knowledge.

Signatures: process: tphirnn.exe: MD5 Hash: 28088020C3EEA46B65B... process: sysmonnt.exe: MD5 Hash: 1035E5EA2AFE9315728... process: wbcmuninst_helper.exe: MD5 Hash: 7172710e9a801394a23... process: ati2cqag.exe: MD5 Hash: 325c4b826ffbae95954... process: update_8.exe: MD5 Hash: 1a1a66a29ed1628affb... process: uueaezf.exe: MD5 Hash: 75050bb83d108101c36... process: stop.00009_4.exe: MD5 Hash: 4373c1d361bcfcbd5e7... process: hlinstaller3.exe: MD5 Hash: 1a7fdbca09b3a4388ae... process: all_files8.exe: MD5 Hash: d721785c5cd4cd2113b... process: nuc91.exe: MD5 Hash: 27b0c47a8c855c04593... process: paphmh.exe: MD5 Hash: 9b0c7661559260f86fe... process: qool.exe: MD5 Hash: fae338bc22adaff405a... process: adsnds39.exe: MD5 Hash: c5417da7d78e08246c5... process: adptif53.exe: MD5 Hash: a2cce2b9b613fea9d9b... process: 4fz.exe: MD5 Hash: 669008e4e35fdeacf16... process: ca.exe: MD5 Hash: 6eab43f6f5bfbf15ebe... process: ml.exe: MD5 Hash: f9a889a1ad498db995a... process: ka3bsuh.exe: MD5 Hash: ee7bc60502223123ec4... process: wbcm_installer.exe: MD5 Hash: 6bc0f700ba6e5a8c8c7... process: hli.exe: MD5 Hash: 87caf54483e8ccf907c... process: hyperlinker2.exe: MD5 Hash: d85d80dced253fd3f91... process: l0jfiniuzu.exe: MD5 Hash: 7378509c0e125dc2cbe... process: yaddgla.exe: MD5 Hash: 75050bb83d108101c36... process: qool.exe: MD5 Hash: 8ce4e4f604d01f20b58..
Type: Spyware - Spyware's primary purpose is to collect demographic and usage information from your computer, usually for advertising purposes. Spyware usually that 'sneaks' onto a system or performs other activities hidden to the user. Spyware programs are usually bundled as a hidden component and downloaded from the Internet. These modules are almost always installed on the system secretively and try to run secretively as well.

Top Spyware Visited Pages:
IEPlugin - Alias: IMIServer IEPlugin, Webplugin, BHO3Lib, ExplWWW, IExpl, MimarSinan, Win Server, winobject, TrojanDow - 126 visits
Spyware.SearchAssistant - Alias: Troj/StartPa-EI - 96 visits
webHancer - Alias: Customer Companion, Webhancer Customer Companion, SpeedRank - 90 visits
PowerReg Scheduler - 90 visits
CWS.Cassandra - 84 visits
Conducent - Alias: Timesink - 79 visits
C2.Lop - Alias: C2 Media, Lop, LopAdvert, MP3Search, MpAdvert, TrojanClicker.Win32.Rotarran - 78 visits
007.msnnames - Alias: access.ocx, jokes.ocx, StopLiteCtrl, StopLite, 007installer - 77 visits
VX2.LocalNRD - Alias: LocalNRD - 77 visits
Aureate - Alias: Aureate Spy, Radiate - 76 visits

Random Spyware Pages:
Spyware.SearchAssistant - Alias: Troj/StartPa-EI
CoolWebSearch.SearchX - Alias: Troj/Krepper-G
C2.Lop - Alias: C2 Media, Lop, LopAdvert, MP3Search, MpAdvert, TrojanClicker.Win32.Rotarran
CoolWebSearch.MWSearch - Alias: A7Find, Azesearch, ADW_SEARCHBAR.D, ZToolbar
VX2.LocalNRD - Alias: LocalNRD


2006-2008 - Privacy Policy