VODSETUPLS27.EXE - Dangerous

VODSETUPLS27.EXE

Manual removal instructions:

Antivirus Report of VODSETUPLS27.EXE:
VODSETUPLS27.EXE Downloader [Symantec] Trojan-Downloader.Win32.Perkesh [Ikarus] packed with UPX [Kaspersky Lab].
VODSETUPLS27.EXEDangerous
VODSETUPLS27.EXEHigh Risk
vodsetupls27.exe
We suggest you to remove VODSETUPLS27.EXE from your computer as soon as possible.
VODSETUPLS27.EXE is known as: Downloader [Symantec] Trojan-Downloader.Win32.Perkesh [Ikarus] packed with UPX [Kaspersky Lab].
MD5 of VODSETUPLS27.EXE = C1383413A1FE45DC0E7A41241EA8C473
VODSETUPLS27.EXE size is 29696 bytes.
Full path on a computer: %TEMP%\VODSETUPLS27.EXE
Related Files:
%SYSTEM%\DBR99005.OCX
%TEMP%\00029D8EIME.TEMP
%TEMP%\00037427EIME.TEMP
%TEMP%\00037427IME.TEMP
%TEMP%\203038
%TEMP%\236102
%TEMP%\C__DOCUME~1_%USERNAME%_LOCALS~1_TEMP_QVODSETUPPLUS.EXE.MEM
%TEMP%\C__DOCUME~1_%USERNAME%_LOCALS~1_TEMP_QVODSETUPPLUS.EXE.TORRENT
%PROGRAMFILES%\COMMON FILES\SYSTEM\KB039382.SRD
%PROGRAMFILES%\COMMON FILES\SYSTEM\KB145679.TAD
%TEMP%\KB431378.SVE
%PROGRAMFILES%\COMMON FILES\SYSTEM\KB588480.PFD
%PROGRAMFILES%\COMMON FILES\SYSTEM\KB675568.PFD
%PROGRAMFILES%\COMMON FILES\SYSTEM\KB681855.CPU
%TEMP%\QVODSETUPPLUS.EXE.!QD
%TEMP%\QVODSETUPPLUS3.EXE
%TEMP%\VODSETUPLS27.EXE
%PROGRAMFILES%\COMMON FILES\SYSTEM\KB588480.SRD
%PROGRAMFILES%\COMMON FILES\SYSTEM\KB588480.TMT
%FONTSDIR%\DBR06033.TTF
%FONTSDIR%\DBR07019.TTF
%SYSTEM%\CDNKJ.EXE
%SYSTEM%\COMRES.DLL.BAK
%SYSTEM%\DBR06033.OCX
%SYSTEM%\DBR07019.OCX
%SYSTEM%\DDRAW.DLL.AGHY
%SYSTEM%\DDRAW.DLL.YLFF
%SYSTEM%\DDRAW.DLL.BKWG
%SYSTEM%\DSOUND.DLL.BAK
%SYSTEM%\GBVGBV07.EXE

Remove VODSETUPLS27.EXE now!

Dmitry Sokolov:

I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.

Since that time I work every day to fix the issues that antiviruses cannot.

If your antivirus have not helped you solve the problem, you should try UnHackMe.

We are a small company and you can ask me directly, if you have any questions.

Testimonials

You can read UnHackMe testimonials here.