How to Remove “WgaTray.exe”

What is wgatray.exe?

wgatray.exe is a legitimate process file popularly known as Windows Genuine Advantage Notification. It is associated with Windows Genuine Advantage application developed by Microsoft Corporation. It is located in C:\Windows\System32 by default. Malware programmers create files with virus scripts and name them after wgatray.exe with an intention to spread virus on the internet.

Affected Platform: Windows OS

How to check if your computer is infected with wgatray.exe malware?

Keep an eye for the following symptoms to see if your PC is infected with wgatray.exe malware:

  • Internet connection fluctuates
  • wgatray.exe takes too much CPU space
  • PC slows down significantly
  • Browser automatically redirects to some irrelevant websites
  • Unsolicited ads and popups starts appearing
  • Screen freezes constantly

Take the following steps to diagnose your PC for possible wgatray.exe malware attack:

Step 1: Simultaneously press CTRL+ALT+DEL keys to open Task Manager.

Step 2: If you notice the file located outside C:\Windows\System32, then you should run an antivirus scan to get rid of the malware.

How to remove wgatray.exe malware from system using Comodo Antivirus?

Step 1: Download the award-winning Free Antivirus.

Step 2: Installation configuration frames will be displayed. Select the configuration you would like to apply.

Step 3: After network detection is complete, press “Close” button for a scan window.

Step 4: Restart your PC.

Step 5: It will take some time for the Comodo Internet Security to update the antivirus.

Step 6: Proceed with a quick scan that automatically begins after the update.

Step 7: If threats are found during the scanning, you will be prompted with an alert screen.

Step 8: Comodo Antivirus will remove the wgatray.exe virus from your computer including all other malwares!

4

Malware Entries

First Seen: 02 April 2009 at 6:12 am
No. Company File Type SHA1 MD5 Malware
Name
Digitally
Signed
File
Version
Product
Version
Submitted
From
Malware Behavior
1 Microsoft Corporation Executable 1e651c6d645f2193
b868dd5fe913ad1e
53554278
40f48806b8e90199
dd5e4fad1a4f3470
Unclassified
Malware
No 1.9.0040.0 1.9.0040.0 Bulgaria N/A
2 N/A Executable 31c36dfeb1997683
d7af5cfd1c300841
bf5fe3a1
f0392294b2480c56
2b4d88b7e9fe7c3c
Unclassified
Malware
No N/A N/A Spain N/A
3 Microsoft Corporation Executable 5338b5d2f76c3925
a8e2cc7c5e8be2e3
61486285
e108e9c35a07c3ac
5481a5b1eacf5051
Unclassified
Malware
No 1.5.0526.0 1.5.0526.0 10.224.1.116/32 N/A
4 Microsoft Corporation Executable de88380aa003dc98
d2c93ca9bda53846
0ade703c
e5b715a15d56c2a2
01da300e40e0078a
Win32.Jeefo.
A
No 1.5.0540.0 1.5.0540.0 Poland N/A
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
36

Safe Entries

First Seen: 02 July 2008 at 4:39 pm
No. Company File Type SHA1 MD5 Digitally
Signed
File
Version
Product
Version
Submitted
From
1 Microsoft Corporation Executable 0bb42d625ccb8394
f406f08c5713a56f
b87e570e
6a8e1ed7790c5510
6b6c2bd6db0e0f1d
Yes 1.8.0031.9 1.8.0031.9 United States
2 Microsoft Corporation Executable d749f7d149fc816f
793d7d3ec526745c
eec01cfc
1c3abcb3ae8245cd
a4868a8e9a42d527
No 1.8.0031.9 1.8.0031.9 Internal Submission
3 Microsoft Corporation Executable 97e8964211274c97
c574ffd591c1a63a
26963b48
0053dae302558ec0
9a12a22f06935437
No 1.7.0036.0 1.7.0036.0 198.20.167.84/32
4 Microsoft Corporation Executable 36504c46318f32bb
eb388933f2767516
9de1e752
bfb7e29151fba0df
4a899cda4a87353c
No 1.5.0540.0 1.5.0540.0 Internal Submission
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
 

Comodo Internet Security Pro

Free Antivirus protection from hackers! Get the ultimate Antivirus solution to keep your PC clean and to remove viruses from a slow or infected PC. Improve the PC performance at home or use it on-the-go!

Get Comodo Internet Security Comodo Internet Security
Exclusive Offer
Get Free Endpoint Protection
Get Advanced
Endpoint
Protection

Award-Winning Security to Protect Your Clients from Cyber Attacks