I recommend you UnHackMe - Ultimate Malware Killer for fast malware removal:
Free DownloadFully Functional 30-day Trial. No credit card is required.
Reviews. EULA. Privacy Policy. Uninstall.
WMPSCFGS.EXE – Rootkit ZeroAccess removal
File | MD5 | Virus Alias |
---|---|---|
WMPSCFGS.EXE | 1d43302f6b17bbe0dc0b94894a47bce5 | Rootkit ZeroAccess |
WMPSCFGS.EXE | 1d43302f6b17bbe0dc0b94894a47bce5 | Trojan Click |
WMPSCFGS.EXE | 1d43302f6b17bbe0dc0b94894a47bce5 | Trojan BZub |
WMPSCFGS.EXE | 1d43302f6b17bbe0dc0b94894a47bce5 | Trojan Eldorado |
WMPSCFGS.EXE | 1d43302f6b17bbe0dc0b94894a47bce5 | Trojan Downloader |
WMPSCFGS.EXE | 1d43302f6b17bbe0dc0b94894a47bce5 | Trojan Swizzor |
WMPSCFGS.EXE size: 650906 bytes
WMPSCFGS.EXE hash: 1D43302F6B17BBE0DC0B94894A47BCE5
Created files:
C:\killok\killok .exe
%Program Files%\Adobe\acrotray .exe
%Program Files%\Adobe\acrotray.exe
%Program Files Common%\Apple\Apple Application Support\apsdaemon .exe
%Program Files%\internet explorer\wmpscfgs.exe
%SysDir%\ctfmon .exe
%SysDir%\vboxtray .exe
%Local AppData%\Google\Update\googleupdate .exe
Detected by UnHackMe:
WMPSCFGS.EXE
Default location: %PROGRAM FILES%\INTERNET EXPLORER\WMPSCFGS.EXE
Dropper information:
MD5: c5d57f6b58270c0ac2f775efc01d5710
File size: 619978 bytes