Backdoor.Zegost.F!dll Description

Backdoor.Zegost.F!dll is a noxious backdoor Trojan infection that can access the corrupted computer system without an affected PC user's consent and knowledge. Backdoor.Zegost.F!dll adds rootkits to hide its existence from security applications. Backdoor.Zegost.F!dll can spread via drive-by downloads or instant messengers and social networking websites. Backdoor.Zegost.F!dll can slow down your PC and restrict you from normal web browsing. Backdoor.Zegost.F!dll can drop other malware infections to the infected machine. Delete Backdoor.Zegost.F!dll as soon as possible.

Aliases: BDS/Zegost.F.96 [AntiVir], Gen:Variant.Symmi.16591 (B), Gen:Variant.Symmi.17983 [BitDefender], Gen:Variant.Symmi.16591, BackDoor.Generic15.BGGP [AVG], TrojanSpy.Agent.wmc, Trojan.PWS.Spy.14828 [DrWeb], Trojan-Spy.Win32.Agent.ccaq [Kaspersky], BackDoor.Generic16.BMUB [AVG], Gen:Trojan.Heur.LP.cu5@aGIwgQf (B), BDS/Zegost.F.43 [AntiVir], Artemis!F81ABC6F6FB1 [McAfee], Backdoor.Generic.767487, PSW.Agent.ASUT [AVG] and TrojanSpy.Agent.vjv.

Technical Information

File System Details

Backdoor.Zegost.F!dll creates the following file(s):
# File Name Size MD5 Detection Count
1 %WINDIR%\system32\FastUserSwitchingCompatibilityex.dll 73,728 3bc94fa713074cf358c1d966e689f093 9
2 %WINDIR%PDHBub.scr 1,185,280 019ac8e7bc6e56ffc1471cf0ceb3998d 4
3 %APPDATA%\A4AFC98FA18D2F0399E3C23E94D60571\kocinc700kk.exe 2,105,856 3e81581851c31de85bde7cc3a23f3c30 2
4 %WINDIR%\system32\CertPropSvcex.dll 73,728 f465aac68575012527a1e68681e5566d 2
5 %WINDIR%\system32\Iasex.dll 73,728 f961db6c6c087df16c25aebfdb809ae7 1
6 %WINDIR%\system32\Irmonex.dll 77,844 a6773b06ec36bf0a929087dcc6ebd54e 1
7 PDHBub.scr N/A
More files

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.

HTML is not allowed.