TSEKTJKJ.EXE

I recommend you UnHackMe - Ultimate Malware Killer for fast malware removal:

Download UnHackMe
Fully Functional 30-day Trial. No credit card is required. Reviews. EULA. Privacy Policy.

The file TSEKTJKJ.EXE is malware related.
You must delete the file TSEKTJKJ.EXE immediately!
Delete the file TSEKTJKJ.EXE without delay!
Kill the process TSEKTJKJ.EXE and remove TSEKTJKJ.EXE from the Windows startup.

TSEKTJKJ.EXE Information and Removal:
TSEKTJKJ.EXE is known as: Malware.Rahack.B!rem [PCTools] Net-Worm.Win32.Allaple.b [Kaspersky Lab] W32/RAHack [McAfee] W32/Allaple-F [Sophos] Worm:Win32/Allaple.A [Microsoft] Net-Worm.Win32.Allaple [Ikarus] Win-Trojan/Starman.Gen [AhnLab].
MD5 of TSEKTJKJ.EXE = C987361F9E462B5E6742137CE781A5A6
TSEKTJKJ.EXE size is 63488 bytes.
Full path on a computer: %PROGRAMFILES%\COMMON FILES\SYSTEM\ADO\TSEKTJKJ.EXE
Related Files:
[PATHNAME WITH A STRING SHARE]\BCWVZWBH.EXE
[PATHNAME WITH A STRING SHARE]\BHRHNKHT.EXE
[PATHNAME WITH A STRING SHARE]\BNBTZWXT.EXE
[PATHNAME WITH A STRING SHARE]\BRVRJRKE.EXE
[PATHNAME WITH A STRING SHARE]\BZQLKHRH.EXE
[PATHNAME WITH A STRING SHARE]\CZJEVCET.EXE
[PATHNAME WITH A STRING SHARE]\EHBEBSRN.EXE
[PATHNAME WITH A STRING SHARE]\ELWTJNBJ.EXE
[PATHNAME WITH A STRING SHARE]\NJBSVTLL.EXE
[PATHNAME WITH A STRING SHARE]\NSQJTTKV.EXE
[PATHNAME WITH A STRING SHARE]\QJLLSJHL.EXE
[PATHNAME WITH A STRING SHARE]\TLCWJRWT.EXE
[PATHNAME WITH A STRING SHARE]\VKJLJZRN.EXE
[PATHNAME WITH A STRING SHARE]\XRLJQJZN.EXE
%PROGRAMFILES%\COMMON FILES\SYSTEM\ADO\TSEKTJKJ.EXE
%PROGRAMFILES%\NETMEETING\RSEWZJQN.EXE
C:\TVSKNRSE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\HRTBEBZE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\JBNXJTKN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\TNSLRRHK.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\ZLHQRLBX.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\DVDUPGRD\SHRRTJET.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\ERRMSG\VLVXQREK.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\ERRORS\JCJJLQNQ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\NETDIAG\HSJQSCHN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\NETDIAG\XRVXSZVS.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\PANELS\NNTLSKWN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\PANELS\SNCNCWEB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\RC\QBRBLTHB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\COMMON\HXRSHQSJ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\COMMON\RWCJRQHW.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\COMMON\SESHHTTH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\EKJVHBCN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\JJENNETL.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\KNENVXLJ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\TTZVRBZR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\WBJBJELB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\ZQWKJBBT.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\BBSBRLEE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\KBZZLWLR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\RBNTKEVT.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\SHNKJJBH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\CCTHWJLR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\CTJXLJXH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\EZSLQRBZ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\NEQVZKEH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\SHRNXSHQ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\RQXJHBSL.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\RZQSTBQQ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\WESNHZEC.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\BJLKJRLS.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\CNTBRBZR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\JBRHBZTZ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\JRTQCSSX.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\RBCJJWQR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\RERCRNHH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\RNBRKRLV.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\VKCHBBXH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\LWKLBVZE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\QXSHKKQN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\RRBVCSBB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\SNQESJRK.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\TRKHKJXZ.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\ERWSKEQR.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\KKRTRBNS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\COMMON\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\ESCALATION\COMMON\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\ESCALATION\EMAIL\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\VSEKKEHE.EXE
%SYSTEM%\URDVXC.EXE
%WINDIR%\WEB\WCXNJHHJ.EXE

Leave a Reply