w3ssveds.exe - Dangerous
%sysdir%\w3ssveds.exe
Manual removal instructions:
Antivirus Report of %sysdir%\w3ssveds.exe:
%sysdir%\w3ssveds.exe
w3ssveds.exe is rootkit Trojan.PPdoor-M.
w3ssveds.exe is used to hide files, processes and registry.
w3ssveds.exe is a user mode rootkit.
Rootkit contacts remote hacker server using HTTP session.
Rootkit injects itself into other process.
Related files:
%SysDir%\w3ssveds.exe
%SysDir%\gofsklzk.dll
%SysDir%\kasgfka.dll
Adds the value:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ ShellServiceObjectDelayLoad
Meeting Connection
(6A436F1A-92DA-4279-91D2-0F9955CE70DE)
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Access WebControl
to the Windows startup registry keys.
%sysdir%\w3ssveds.exe | Malware |
%sysdir%\w3ssveds.exe | Dangerous |
%sysdir%\w3ssveds.exe | High Risk |
w3ssveds.exe is used to hide files, processes and registry.
w3ssveds.exe is a user mode rootkit.
Rootkit contacts remote hacker server using HTTP session.
Rootkit injects itself into other process.
Related files:
%SysDir%\w3ssveds.exe
%SysDir%\gofsklzk.dll
%SysDir%\kasgfka.dll
Adds the value:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ ShellServiceObjectDelayLoad
Meeting Connection
(6A436F1A-92DA-4279-91D2-0F9955CE70DE)
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Access WebControl
to the Windows startup registry keys.
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.