I recommend you UnHackMe - Ultimate Malware Killer for fast malware removal:
Free DownloadFully Functional 30-day Trial. No credit card is required.
Reviews. EULA. Privacy Policy. Uninstall.
The file WCXNJHHJ.EXE is identified as the Trojan Program that is used for stealing bank information and users passwords.
To delete WCXNJHHJ.EXE we suggest you should use UnHackMe:
http://www.unhackme.com
WCXNJHHJ.EXE Information and Removal:
WCXNJHHJ.EXE is known as: Malware.Rahack.B!rem [PCTools] Net-Worm.Win32.Allaple.b [Kaspersky Lab] W32/RAHack [McAfee] W32/Allaple-F [Sophos] Worm:Win32/Allaple.A [Microsoft] Net-Worm.Win32.Allaple [Ikarus] Win-Trojan/Starman.Gen [AhnLab].
MD5 of WCXNJHHJ.EXE = DCAC23B5774CC3B9CA28AD57EE18AC1E
WCXNJHHJ.EXE size is 82944 bytes.
Full path on a computer: %WINDIR%\WEB\WCXNJHHJ.EXE
Related Files:
[PATHNAME WITH A STRING SHARE]\BCWVZWBH.EXE
[PATHNAME WITH A STRING SHARE]\BHRHNKHT.EXE
[PATHNAME WITH A STRING SHARE]\BNBTZWXT.EXE
[PATHNAME WITH A STRING SHARE]\BRVRJRKE.EXE
[PATHNAME WITH A STRING SHARE]\BZQLKHRH.EXE
[PATHNAME WITH A STRING SHARE]\CZJEVCET.EXE
[PATHNAME WITH A STRING SHARE]\EHBEBSRN.EXE
[PATHNAME WITH A STRING SHARE]\ELWTJNBJ.EXE
[PATHNAME WITH A STRING SHARE]\NJBSVTLL.EXE
[PATHNAME WITH A STRING SHARE]\NSQJTTKV.EXE
[PATHNAME WITH A STRING SHARE]\QJLLSJHL.EXE
[PATHNAME WITH A STRING SHARE]\TLCWJRWT.EXE
[PATHNAME WITH A STRING SHARE]\VKJLJZRN.EXE
[PATHNAME WITH A STRING SHARE]\XRLJQJZN.EXE
%PROGRAMFILES%\COMMON FILES\SYSTEM\ADO\TSEKTJKJ.EXE
%PROGRAMFILES%\NETMEETING\RSEWZJQN.EXE
C:\TVSKNRSE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\HRTBEBZE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\JBNXJTKN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\TNSLRRHK.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\ZLHQRLBX.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\DVDUPGRD\SHRRTJET.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\ERRMSG\VLVXQREK.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\ERRORS\JCJJLQNQ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\NETDIAG\HSJQSCHN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\NETDIAG\XRVXSZVS.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\PANELS\NNTLSKWN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\PANELS\SNCNCWEB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\RC\QBRBLTHB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\COMMON\HXRSHQSJ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\COMMON\RWCJRQHW.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\COMMON\SESHHTTH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\EKJVHBCN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\JJENNETL.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\KNENVXLJ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\TTZVRBZR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\WBJBJELB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\ZQWKJBBT.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\BBSBRLEE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\KBZZLWLR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\RBNTKEVT.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\SHNKJJBH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\CCTHWJLR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\CTJXLJXH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\EZSLQRBZ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\NEQVZKEH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\SHRNXSHQ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\RQXJHBSL.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\RZQSTBQQ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\WESNHZEC.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\BJLKJRLS.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\CNTBRBZR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\JBRHBZTZ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\JRTQCSSX.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\RBCJJWQR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\RERCRNHH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\RNBRKRLV.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\VKCHBBXH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\LWKLBVZE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\QXSHKKQN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\RRBVCSBB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\SNQESJRK.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\TRKHKJXZ.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\ERWSKEQR.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\KKRTRBNS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\COMMON\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\ESCALATION\COMMON\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\ESCALATION\EMAIL\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\VSEKKEHE.EXE
%SYSTEM%\URDVXC.EXE
%WINDIR%\WEB\WCXNJHHJ.EXE