Bạn đang xem: Wscript
What is wscript.exe?
The wscript.exe file belongs to the Microsoft Windows Operating System. Note that wscript.exe is also known as Windows Script, a service that provides the Windows system with scripting abilities. Unfortunately, cyber criminals often use the names of legitimate processes and files to disguise malware. It is possible that the wscript.exe might also be used for this purpose.
Typically, the wscript.exe executable can be located in "C:WindowsSystem32", a Windows folder that contains operating system files, however, if the wscript.exe filename is used to disguise malware, this file is placed in another folder and/or will have a different name (for example, wcript.exe).
Typically, cyber criminals give names very similar to legitimate files to avoid suspicion. Furthermore, when a malicious process is running in Task Manager, it usually contains a graphic icon beside it, when in fact it should have a system icon. Note that virus detection engines sometimes detect legitimate files as threats (provide "false positive" results).
This usually happens due to errors/mistakes in databases. Fortunately, these issues are generally fixed quickly, however, in some cases, the reverse can happen: malicious files are named as legitimate system files, and thereby bypass virus engines and infect computers.
These malicious files can be used to infect computers with high-risk malware that might be designed to steal sensitive, personal details (passwords, logins of personal, banking accounts, and so on), log keystrokes, proliferate other viruses, etc.
In summary, such programs might cause data/financial loss, privacy, browsing safety issues, and various other problems. If a computer is infected with a program of this type, it should be eliminated immediately.
|Threat Type||Trojan, False positive detection, Password-stealing virus, Banking malware, Spyware|
|Detection Names (malicious wscript.exe file)||Avast (Win32:Vitro), BitDefender (Win32.Virtob.Gen.12), ESET-NOD32 (Win32/Virut.NBP), Kaspersky (Virus.Win32.Virut.ce), Full List (VirusTotal)|
|Malicious Process Name (malicious wscript.exe file)||Microsoft (r) Windows Based Script Host|
|Symptoms||Trojans are designed to stealthily infiltrate the victim"s computer and remain silent, and thus no particular symptoms are clearly visible on an infected machine.|
|Distribution methods||Infected email attachments, malicious online advertisements, social engineering, software "cracks".|
|Additional Information||wscript.exe is a genuine Microsoft Windows process. However, some cyber criminals use it to disguise malware.|
|Damage||Stolen banking information, passwords, identity theft, victim"s computer added to a botnet.|
|Malware Removal (Windows)|
To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner.▼ Download Combo Cleaner To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of fundacionfernandovillalon.com read more.
Cyber criminals use names of various legitimate processes/files to disguise malicious files. Some examples of files that could also be used to disguise malware are csrss.exe, msfeedssync.exe, and gwx.exe. Be sure that any detected files are genuine threats, and only then remove them, otherwise this might lead to loss of legitimate operating system files.
How did wscript.exe infiltrate my computer?
There is more than one way to distribute/proliferate malicious files and programs. Frequently, cyber criminals use spam campaigns, fake software updaters, trojans, software "cracking" tools, or untrustworthy software download sources.
Fake software update tools infect systems by downloading and installing malicious programs rather than installing updates, or by exploiting bugs/flaws of installed and outdated software. Trojans are malicious programs. To cause any damage, however, they must already be installed. Once installed, they cause download and installation of malware.
Activation ("cracking") tools are programs that allow users to illegally bypass activation of software free of charge, however, cyber criminals can use them to proliferate malware.
Third party downloaders, freeware download websites, free file hosting websites, Peer-to-Peer (P2P) networks such as eMule, torrent clients and other dubious download sources are often used to present infected files as legitimate. People who download and open them, often cause installation of malicious programs.
How to avoid installation of malware?
Avoid opening attachments or links that are included in irrelevant emails that are received from unknown, suspicious addresses. Emails of this type should not be trusted or their contents (web links, attachments) opened. Download software from official, trustworthy websites. Do not use the tools mentioned above.
Keep installed software up-to-date, however, use tools or functions provided by official software developers. Do not use third party tools to activate software. This is illegal and often causes damage to the system (computer infections). Have reputable anti-virus or anti-spyware software installed and perform regular virus scans.
If you believe that your computer is already infected, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate infiltrated malware.
Screenshot of a malicious wscript.exe file detected as a threat by multiple virus engines:
How to remove malware manually?
Manual malware removal is a complicated task - usually it is best to allow antivirus or anti-malware programs to do this automatically.
Xem thêm: Nghĩa Của Từ Cost Effective Là Gì, Từ Điển Anh Việt Cost
To remove this malware we recommend using Combo Cleaner Antivirus for Windows. If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here is an example of a suspicious program running on a user"s computer:
If you checked the list of programs running on your computer, for example, using task manager, and identified a program that looks suspicious, you should continue with these steps:
Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.