Remove WEWATCHERPROXY.EXE malware
WEWATCHERPROXY.EXE Malware Removal Guide
Manual removal instructions:
Antivirus Report of WEWATCHERPROXY.EXE:
wewatcherproxy.exe
Full path on a computer: %PROGRAM FILES%\SYSFILES\WEWATCHERPROXY.EXE
Autostart registry keys:
HKLM\Software\Classes\AppID\WeWatcherProxy.EXE
HKLM\Software\Classes\AppID\WeWatcherProxy.EXE\AppID: "{BB5E0EB5-8A8C-441E-B6B0-D8A5614571C7}"
HKLM\Software\Classes\CLSID\{00D9F0F4-07BB-46A9-9993-C8F7EA2A21F3}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{3A9C223B-F390-430D-A334-990BC5E729AB}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{CB096813-49C6-4D28-A48A-3911F7A2F629}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{D3339B22-715E-4A50-A27D-248949E43CF7}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{F76C5FE5-5CAA-4B3B-8A94-126BC3F47475}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{F81EFBCB-6699-497D-9744-99206A6A88EB}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{FA80FB09-4BE0-4796-AF67-FE5858BC301D}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{FF392F00-BDC2-468B-9255-00F8E8EBD017}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\System\CurrentControlSet\Services\WeWatcherProxy\ImagePath: "%Program Files%\SysFiles\WeWatcherProxy.exe"
Related Files:
%Program Files%\SysFiles\WeWatcherLSP64.dll
%Program Files%\SysFiles\WeWatcherLSP64.exe
%Program Files%\SysFiles\WeWatcherProxy.exe
%Program Files%\SysFiles\WeWatcherProxy.tlb
%Program Files%\SysFiles\wwd.sys
The file WEWATCHERPROXY.EXE is malware related.
You must delete the file WEWATCHERPROXY.EXE immediately!
Delete the file WEWATCHERPROXY.EXE without delay!
Kill the process WEWATCHERPROXY.EXE and remove WEWATCHERPROXY.EXE from the Windows startup.
WEWATCHERPROXY.EXE is related to: Generic.3CD, WEWATCHERPROXY.EXE.
Virustotal = 7/53
MD5 = DA1549898F29E2A8610D81A6973885ED
WEWATCHERPROXY.EXE | Malware |
WEWATCHERPROXY.EXE | Dangerous |
WEWATCHERPROXY.EXE | High Risk |
Autostart registry keys:
HKLM\Software\Classes\AppID\WeWatcherProxy.EXE
HKLM\Software\Classes\AppID\WeWatcherProxy.EXE\AppID: "{BB5E0EB5-8A8C-441E-B6B0-D8A5614571C7}"
HKLM\Software\Classes\CLSID\{00D9F0F4-07BB-46A9-9993-C8F7EA2A21F3}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{3A9C223B-F390-430D-A334-990BC5E729AB}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{CB096813-49C6-4D28-A48A-3911F7A2F629}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{D3339B22-715E-4A50-A27D-248949E43CF7}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{F76C5FE5-5CAA-4B3B-8A94-126BC3F47475}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{F81EFBCB-6699-497D-9744-99206A6A88EB}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{FA80FB09-4BE0-4796-AF67-FE5858BC301D}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\Software\Classes\CLSID\{FF392F00-BDC2-468B-9255-00F8E8EBD017}\LocalServer32\: "%Program Files%\SysFiles\WeWatcherProxy.exe"
HKLM\System\CurrentControlSet\Services\WeWatcherProxy\ImagePath: "%Program Files%\SysFiles\WeWatcherProxy.exe"
Related Files:
%Program Files%\SysFiles\WeWatcherLSP64.dll
%Program Files%\SysFiles\WeWatcherLSP64.exe
%Program Files%\SysFiles\WeWatcherProxy.exe
%Program Files%\SysFiles\WeWatcherProxy.tlb
%Program Files%\SysFiles\wwd.sys
The file WEWATCHERPROXY.EXE is malware related.
You must delete the file WEWATCHERPROXY.EXE immediately!
Delete the file WEWATCHERPROXY.EXE without delay!
Kill the process WEWATCHERPROXY.EXE and remove WEWATCHERPROXY.EXE from the Windows startup.
WEWATCHERPROXY.EXE is related to: Generic.3CD, WEWATCHERPROXY.EXE.
Virustotal = 7/53
MD5 = DA1549898F29E2A8610D81A6973885ED
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.