INYJBRYCN.EXE - Dangerous

INYJBRYCN.EXE

Manual removal instructions:

Antivirus Report of INYJBRYCN.EXE:
INYJBRYCN.EXE Backdoor.PCRat, Password-Stealer ( e4a17cde0 ), Password-Stealer ( 002d15bf1 ), Trojan.Magania.euwr, Trojan.Magania.czhtp, Backdoor.Trojan, Crypt.BHCB, BKDR_INJECT.SMJ, WIN.Spy.Magania-278, Trojan-GameThief.Magania.euwr, Trojan.A.PSW-Magania.736616, Virus.Part.b, Troj.Zegost-S, Trojan.PSW.Magania.baea, Hack.Huigezi.ec.(kcloud), Backdoor.PcClient.ZR, Trojan.Agent.Gen-Sinar, Dropper.PcClient, BScope.Trojan.SvcHorse.01643, a variant of Win32.Farfli.AKJ, Backdoor.Farfli.4805, Backdoor.Zegost, W32.Injector.MAG.tr, Agent2.AXBR, Trj.Downloader.MDW.
INYJBRYCN.EXEDangerous
INYJBRYCN.EXEHigh Risk
inyjbrycn.exe
We suggest you to remove INYJBRYCN.EXE from your computer as soon as possible.
INYJBRYCN.EXE is known as: Backdoor.PCRat, Password-Stealer ( e4a17cde0 ), Password-Stealer ( 002d15bf1 ), Trojan.Magania.euwr, Trojan.Magania.czhtp, Backdoor.Trojan, Crypt.BHCB, BKDR_INJECT.SMJ, WIN.Spy.Magania-278, Trojan-GameThief.Magania.euwr, Trojan.A.PSW-Magania.736616, Virus.Part.b, Troj.Zegost-S, Trojan.PSW.Magania.baea, Hack.Huigezi.ec.(kcloud), Backdoor.PcClient.ZR, Trojan.Agent.Gen-Sinar, Dropper.PcClient, BScope.Trojan.SvcHorse.01643, a variant of Win32.Farfli.AKJ, Backdoor.Farfli.4805, Backdoor.Zegost, W32.Injector.MAG.tr, Agent2.AXBR, Trj.Downloader.MDW.
MD5 of INYJBRYCN.EXE = be3b0447c0267911145cbf5691bfe8f4
INYJBRYCN.EXE size is 802197 bytes.
Full path on a computer: %SYSDIR%\INYJBRYCN.EXE
Related Files:
%Temp%\32328_lang.dll
%SysDir%\inyjbrycn.exe
%SysDir%\inyjbrycn.exe_lang.ini
%SysDir%\syslog.dat

Remove INYJBRYCN.EXE now!

Dmitry Sokolov:

I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.

Since that time I work every day to fix the issues that antiviruses cannot.

If your antivirus have not helped you solve the problem, you should try UnHackMe.

We are a small company and you can ask me directly, if you have any questions.

Testimonials

You can read UnHackMe testimonials here.