Remove {FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE malware

{FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE Malware Removal Guide

Manual removal instructions:

Antivirus Report of {FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE:
{FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE Malware
{FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXEDangerous
{FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXEHigh Risk
{fd9f837c-5851-47a2-a9b3-b6680cce76b7}.exe
Full path on a computer: %APPDATA%\IDENTITIES\{FD9F837C-5851-47A2-A9B3-B6680CCE76B7}\{FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE
Related Files:
%APPDATA%\FAR MANAGER\PROFILE\PROFILE.EXE
%APPDATA%\FAR MANAGER\FAR MANAGER.EXE
%APPDATA%\IDENTITIES\{FD9F837C-5851-47A2-A9B3-B6680CCE76B7}\{FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE
%APPDATA%\IDENTITIES\IDENTITIES.EXE
%APPDATA%\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\DX3TJUNF\S.YTIMG.COM\S.YTIMG.COM.EXE

The file {FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE is a computer worm.
The worm {FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE is a self-replicating malicious program,
which uses a computer network to send copies of itself to other
computers.
You must fix the {FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE problem as soon as possible!
Delete the file {FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE from all infected computers in your network.
Set up your network firewall against {FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE intervention.
{FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE is related to: PE:Worm.VB!1.9ED3, {FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE.
Virustotal = 46/53
MD5 = 6B2684BB48FF18CA6AEAE85A9C11AB20
File Size: 910336

Remove {FD9F837C-5851-47A2-A9B3-B6680CCE76B7}.EXE now!

Dmitry Sokolov:

I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.

Since that time I work every day to fix the issues that antiviruses cannot.

If your antivirus have not helped you solve the problem, you should try UnHackMe.

We are a small company and you can ask me directly, if you have any questions.

Testimonials

You can read UnHackMe testimonials here.