Solved! Use WMPSCFGS.EXE (Rootkit ZeroAccess) Removal Guide

I recommend you UnHackMe - Ultimate Malware Killer for fast malware removal:

Download UnHackMe
Fully Functional 30-day Trial. No credit card is required. Reviews. EULA. Privacy Policy.

WMPSCFGS.EXE – Rootkit ZeroAccess removal

File MD5 Virus Alias
WMPSCFGS.EXE 1d43302f6b17bbe0dc0b94894a47bce5 Rootkit ZeroAccess
WMPSCFGS.EXE 1d43302f6b17bbe0dc0b94894a47bce5 Trojan Click
WMPSCFGS.EXE 1d43302f6b17bbe0dc0b94894a47bce5 Trojan BZub
WMPSCFGS.EXE 1d43302f6b17bbe0dc0b94894a47bce5 Trojan Eldorado
WMPSCFGS.EXE 1d43302f6b17bbe0dc0b94894a47bce5 Trojan Downloader
WMPSCFGS.EXE 1d43302f6b17bbe0dc0b94894a47bce5 Trojan Swizzor

WMPSCFGS.EXE size: 650906 bytes
WMPSCFGS.EXE hash: 1D43302F6B17BBE0DC0B94894A47BCE5

Created files:

C:\killok\killok .exe
%Program Files%\Adobe\acrotray .exe
%Program Files%\Adobe\acrotray.exe
%Program Files Common%\Apple\Apple Application Support\apsdaemon .exe
%Program Files%\internet explorer\wmpscfgs.exe
%SysDir%\ctfmon .exe
%SysDir%\vboxtray .exe
%Local AppData%\Google\Update\googleupdate .exe

Detected by UnHackMe:

WMPSCFGS.EXE
Default location: %PROGRAM FILES%\INTERNET EXPLORER\WMPSCFGS.EXE

Dropper information:
MD5: c5d57f6b58270c0ac2f775efc01d5710
File size: 619978 bytes

Leave a Reply