WCXNJHHJ.EXE - Dangerous
WCXNJHHJ.EXE
Manual removal instructions:
Antivirus Report of WCXNJHHJ.EXE:
wcxnjhhj.exe
We suggest you to remove WCXNJHHJ.EXE from your computer as soon as possible.
WCXNJHHJ.EXE is known as: Malware.Rahack.B!rem [PCTools] Net-Worm.Win32.Allaple.b [Kaspersky Lab] W32/RAHack [McAfee] W32/Allaple-F [Sophos] Worm:Win32/Allaple.A [Microsoft] Net-Worm.Win32.Allaple [Ikarus] Win-Trojan/Starman.Gen [AhnLab].
MD5 of WCXNJHHJ.EXE = DCAC23B5774CC3B9CA28AD57EE18AC1E
WCXNJHHJ.EXE size is 82944 bytes.
Full path on a computer: %WINDIR%\WEB\WCXNJHHJ.EXE
Related Files:
[PATHNAME WITH A STRING SHARE]\BCWVZWBH.EXE
[PATHNAME WITH A STRING SHARE]\BHRHNKHT.EXE
[PATHNAME WITH A STRING SHARE]\BNBTZWXT.EXE
[PATHNAME WITH A STRING SHARE]\BRVRJRKE.EXE
[PATHNAME WITH A STRING SHARE]\BZQLKHRH.EXE
[PATHNAME WITH A STRING SHARE]\CZJEVCET.EXE
[PATHNAME WITH A STRING SHARE]\EHBEBSRN.EXE
[PATHNAME WITH A STRING SHARE]\ELWTJNBJ.EXE
[PATHNAME WITH A STRING SHARE]\NJBSVTLL.EXE
[PATHNAME WITH A STRING SHARE]\NSQJTTKV.EXE
[PATHNAME WITH A STRING SHARE]\QJLLSJHL.EXE
[PATHNAME WITH A STRING SHARE]\TLCWJRWT.EXE
[PATHNAME WITH A STRING SHARE]\VKJLJZRN.EXE
[PATHNAME WITH A STRING SHARE]\XRLJQJZN.EXE
%PROGRAMFILES%\COMMON FILES\SYSTEM\ADO\TSEKTJKJ.EXE
%PROGRAMFILES%\NETMEETING\RSEWZJQN.EXE
C:\TVSKNRSE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\HRTBEBZE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\JBNXJTKN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\TNSLRRHK.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\ZLHQRLBX.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\DVDUPGRD\SHRRTJET.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\ERRMSG\VLVXQREK.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\ERRORS\JCJJLQNQ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\NETDIAG\HSJQSCHN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\NETDIAG\XRVXSZVS.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\PANELS\NNTLSKWN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\PANELS\SNCNCWEB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\RC\QBRBLTHB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\COMMON\HXRSHQSJ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\COMMON\RWCJRQHW.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\COMMON\SESHHTTH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\EKJVHBCN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\JJENNETL.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\KNENVXLJ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\TTZVRBZR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\WBJBJELB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\ZQWKJBBT.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\BBSBRLEE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\KBZZLWLR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\RBNTKEVT.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\SHNKJJBH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\CCTHWJLR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\CTJXLJXH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\EZSLQRBZ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\NEQVZKEH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\SHRNXSHQ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\RQXJHBSL.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\RZQSTBQQ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\WESNHZEC.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\BJLKJRLS.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\CNTBRBZR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\JBRHBZTZ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\JRTQCSSX.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\RBCJJWQR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\RERCRNHH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\RNBRKRLV.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\VKCHBBXH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\LWKLBVZE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\QXSHKKQN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\RRBVCSBB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\SNQESJRK.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\TRKHKJXZ.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\ERWSKEQR.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\KKRTRBNS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\COMMON\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\ESCALATION\COMMON\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\ESCALATION\EMAIL\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\VSEKKEHE.EXE
%SYSTEM%\URDVXC.EXE
%WINDIR%\WEB\WCXNJHHJ.EXE
WCXNJHHJ.EXE | Malware.Rahack.B!rem [PCTools] Net-Worm.Win32.Allaple.b [Kaspersky Lab] W32/RAHack [McAfee] W32/Allaple-F [Sophos] Worm:Win32/Allaple.A [Microsoft] Net-Worm.Win32.Allaple [Ikarus] Win-Trojan/Starman.Gen [AhnLab]. |
WCXNJHHJ.EXE | Dangerous |
WCXNJHHJ.EXE | High Risk |
WCXNJHHJ.EXE is known as: Malware.Rahack.B!rem [PCTools] Net-Worm.Win32.Allaple.b [Kaspersky Lab] W32/RAHack [McAfee] W32/Allaple-F [Sophos] Worm:Win32/Allaple.A [Microsoft] Net-Worm.Win32.Allaple [Ikarus] Win-Trojan/Starman.Gen [AhnLab].
MD5 of WCXNJHHJ.EXE = DCAC23B5774CC3B9CA28AD57EE18AC1E
WCXNJHHJ.EXE size is 82944 bytes.
Full path on a computer: %WINDIR%\WEB\WCXNJHHJ.EXE
Related Files:
[PATHNAME WITH A STRING SHARE]\BCWVZWBH.EXE
[PATHNAME WITH A STRING SHARE]\BHRHNKHT.EXE
[PATHNAME WITH A STRING SHARE]\BNBTZWXT.EXE
[PATHNAME WITH A STRING SHARE]\BRVRJRKE.EXE
[PATHNAME WITH A STRING SHARE]\BZQLKHRH.EXE
[PATHNAME WITH A STRING SHARE]\CZJEVCET.EXE
[PATHNAME WITH A STRING SHARE]\EHBEBSRN.EXE
[PATHNAME WITH A STRING SHARE]\ELWTJNBJ.EXE
[PATHNAME WITH A STRING SHARE]\NJBSVTLL.EXE
[PATHNAME WITH A STRING SHARE]\NSQJTTKV.EXE
[PATHNAME WITH A STRING SHARE]\QJLLSJHL.EXE
[PATHNAME WITH A STRING SHARE]\TLCWJRWT.EXE
[PATHNAME WITH A STRING SHARE]\VKJLJZRN.EXE
[PATHNAME WITH A STRING SHARE]\XRLJQJZN.EXE
%PROGRAMFILES%\COMMON FILES\SYSTEM\ADO\TSEKTJKJ.EXE
%PROGRAMFILES%\NETMEETING\RSEWZJQN.EXE
C:\TVSKNRSE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\HRTBEBZE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\JBNXJTKN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\TNSLRRHK.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\COMPATCTR\ZLHQRLBX.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\DVDUPGRD\SHRRTJET.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\ERRMSG\VLVXQREK.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\ERRORS\JCJJLQNQ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\NETDIAG\HSJQSCHN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\NETDIAG\XRVXSZVS.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\PANELS\NNTLSKWN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\PANELS\SNCNCWEB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\RC\QBRBLTHB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\COMMON\HXRSHQSJ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\COMMON\RWCJRQHW.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\COMMON\SESHHTTH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\EKJVHBCN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\JJENNETL.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\KNENVXLJ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\TTZVRBZR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\WBJBJELB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\CLIENT\ZQWKJBBT.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\BBSBRLEE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\KBZZLWLR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\RBNTKEVT.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\COMMON\SHNKJJBH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\CCTHWJLR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\CTJXLJXH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\EZSLQRBZ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\NEQVZKEH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\INTERACTION\SERVER\SHRNXSHQ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\RQXJHBSL.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\RZQSTBQQ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\REMOTE ASSISTANCE\WESNHZEC.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\BJLKJRLS.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\CNTBRBZR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\JBRHBZTZ.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\JRTQCSSX.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\RBCJJWQR.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\RERCRNHH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\RNBRKRLV.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\SYSINFO\VKCHBBXH.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\LWKLBVZE.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\QXSHKKQN.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\RRBVCSBB.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\SNQESJRK.EXE
%WINDIR%\PCHEALTH\HELPCTR\SYSTEM\UPDATECTR\TRKHKJXZ.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\ERWSKEQR.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\KKRTRBNS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\COMMON\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\ESCALATION\COMMON\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\ESCALATION\EMAIL\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\REMOTE ASSISTANCE\VXWQHWZS.EXE
%WINDIR%\PCHEALTH\HELPCTR\VENDORS\CN=MICROSOFT CORPORATION,L=REDMOND,S=WASHINGTON,C=US\VSEKKEHE.EXE
%SYSTEM%\URDVXC.EXE
%WINDIR%\WEB\WCXNJHHJ.EXE
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.