RUNFILE64.EXE - Dangerous

RUNFILE64.EXE

Manual removal instructions:

Antivirus Report of RUNFILE64.EXE:
RUNFILE64.EXE Malware
RUNFILE64.EXEDangerous
RUNFILE64.EXEHigh Risk
runfile64.exe
We suggest you to remove RUNFILE64.EXE from your computer as soon as possible.
MD5 of RUNFILE64.EXE = C373639CC70FA7F87ABC301E6F3CF991
RUNFILE64.EXE size is 6933937 bytes.
Full path on a computer: %SYSTEM%\RUNFILE64.EXE
Related Files:
%COMMONPROGRAMS%\SENUKE\MANUAL.LNK
%COMMONPROGRAMS%\SENUKE\SENUKE.LNK
%COMMONPROGRAMS%\SENUKE\UNINSTALL SENUKE.LNK
%DESKTOPDIR%\SENUKE.LNK
%SYSTEM%\SERSICES.EXE
%TEMP%\IS-3U1T3.TMP\RUNFILE64.TMP
%TEMP%\IS-LHM1T.TMP\_ISETUP\_REGDLL.TMP
%TEMP%\IS-LHM1T.TMP\_ISETUP\_SHFOLDR.DLL
%TEMP%\MUST READ.TXT
%TEMP%\SEMARANG.DAT
%SYSTEM%\RUNFILE64.EXE
%TEMP%\SETUP2.EXE
%PROGRAMFILES%\SENUKE\BATCHRESEARCHCOMPLETE.WAV
%PROGRAMFILES%\SENUKE\CLOSE_MSGBOXES.EXE
%PROGRAMFILES%\SENUKE\COMPLETE.WAV
%PROGRAMFILES%\SENUKE\EMAILVCOMPLETE.WAV
%PROGRAMFILES%\SENUKE\MANUAL.PDF
%PROGRAMFILES%\SENUKE\PINGINGCOMPLETE.WAV
%PROGRAMFILES%\SENUKE\REGCONTROLS.BAT
%PROGRAMFILES%\SENUKE\SENUKE.EXE
%PROGRAMFILES%\SENUKE\SENUKE.EXE.MANIFEST
%PROGRAMFILES%\SENUKE\UNINS000.DAT
%PROGRAMFILES%\SENUKE\UNINS002.EXE
%PROGRAMFILES%\SENUKE\UNINS002.DAT
%WINDIR%\IS-I0S5R.EXE
%WINDIR%\IS-I0S5R.LST
%WINDIR%\IS-I0S5R.MSG
%SYSTEM%\CHILKATCHARSET.DLL
%SYSTEM%\CHILKATFTP2.DLL
%SYSTEM%\CHILKATHTTP.DLL
%SYSTEM%\CHILKATMAIL_V7_9.DLL
%SYSTEM%\CHILKATSOCKET.DLL
%SYSTEM%\CHILKATUPLOAD.DLL
%SYSTEM%\CHILKATXML.DLL
%SYSTEM%\CKSTRING.DLL
%SYSTEM%\IJL11.DLL
%SYSTEM%\IS-D4SBD.TMP
%SYSTEM%\MSWORD.OLB
%SYSTEM%\SEMARANG.DAT
%SYSTEM%\VB6STKIT.DLL

Remove RUNFILE64.EXE now!

Dmitry Sokolov:

I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.

Since that time I work every day to fix the issues that antiviruses cannot.

If your antivirus have not helped you solve the problem, you should try UnHackMe.

We are a small company and you can ask me directly, if you have any questions.

Testimonials

You can read UnHackMe testimonials here.