

MD5 of ESUGDLGCONTROL.EX- = 2B5C000B2D23BD3F5F3E0C0EE3FC2ACBįull path on a computer: %WINDIR%\TEMP\CLEANWIPE\APP\ESUGDLGCONTROL.EX.

This is considered a Trojan Backdoor also here: ESUGDLGCONTROL.EX- is known as: packed with PE_Patch.

Possibly a PUP and packer FP detection, because here generically we detect HTTP Zbot Activity, seen as a threat: -see: ĭetected as posing a security risk here:. Scan options disabled: Memory | Startup | Registry | Heuristics/Extra | P2PĬ:\Users\imb1\Desktop\CleanWipe\app\ESUGDlgControl.exe (Malware.Gen) -> Quarantined and deleted successfully.Ĭ:\Users\imb1\Desktop\CleanWipe\app\ESUGMSI.exe (Malware.Gen) -> Quarantined and deleted successfully.Ĭ:\Users\imb1\Desktop\CleanWipe\app\ESUGMSIConvert.exe (Virtool.Obfuscator) -> Quarantined and deleted successfully. Scan options enabled: File System | Heuristics/Shuriken | PUP | PUM Do you want me to send in the detected files?
