How to Remove “conf.exe”

What is conf.exe?

conf.exe is a legitimate process file popularly known as conf.exe. It belongs to Windows Operating System, developed by Microsoft Corporation. It is located in C:\Windows\System32 by default.

Malware programmers write virus files with malicious scripts and save them as conf.exe with an intention to spread virus on the internet.

Affected Platform: Windows OS

How to check if your computer is infected with conf.exe malware?

If your system is affected by conf.exe malware, you will notice one or several of the symptoms below:

  • conf.exe occupies an unusually large CPU memory
  • Erratic internet connection
  • Your browser is bombarded with annoying popup ads
  • Computer screen freezes
  • PC's processing speed suffers
  • You are redirected to unknown websites

To pinpoint the virus file location, take the following steps:

Step 1: Press CTRL+ALT+DEL keys at once to open Task Manager.

Step 2: If you notice the file located outside C:\Windows\System32, you should run an antivirus scan to get rid of the malware.

How to remove conf.exe malware from system using Comodo Cleaning Essentials?

You can either choose to remove conf.exe and other malwares using Comodo Antivirus, or Comodo Cleaning Essentials (CCE) – both of which are absolutely free to download! CCE is a set of computer security tools designed to help you identify and remove malwares and unsafe processes from an infected computer.

To remove malwares using CCE, take the following steps:

1. Check the system requirements and download the feature-rich CCE suite for free.

2. After installation, choose the type of scan you want to perform. CCE offers 3 scan options to get rid of malwares from a PC:

  • Smart Scan: Does a scan on critical areas of your system.
  • Full Scan: Does a complete scan of your system.
  • Custom Scan: Does a scan only on selected items.

The process to initiate the above mentioned scans are self-explanatory and thus, easy-to-use. 
Additionally, it's recommended that you approve of any updates that the CCE will prompt you about to ensure it does a better job of identifying all the latest threats.

3. Click 'Next' to view the results.

Regardless of the type of scan you choose, the results will sometimes show false positive (flagging files that are actually safe), which has to be ignored. Only select the files you want to get rid of.

4. Click 'Apply' to apply the selected operations to the threats. The selected operations will be applied.

19

Malware Entries

First Seen: 19 January 2011 at 11:34 pm
No. Company File Type SHA1 MD5 Malware
Name
Digitally
Signed
File
Version
Product
Version
Submitted
From
Malware Behavior
1 Microsoft Corporation Executable d96d8be8ca68bfce
e23e59a558735aee
8c2c505d
47315865ca716889
7d9db4b3632961b1
Worm.Win32.M
abezat.b4
No 5.1.2600.5
512
3.01 Tunisia N/A
2 Microsoft Corporation Executable 2be1d0c5404cefb5
4d91be0ced6b19d6
209d8b6c
62d00e5be28cd05c
3de8a9faf0f21bdb
Worm.Win32.M
abezat.b0
No 5.1.2600.5
512
3.01 Saudi Arabia N/A
3 N/A Executable 15a7f648fd765275
b0e0a97dd561b30f
2e16f4be
0943fcd2f1dfb8f2
b3fb56c242069890
Unclassified
Malware
No N/A N/A Internal Submission N/A
4 Microsoft Corporation Executable 8c89e67bcf622a96
fb9a3695ac4e2376
d8efd8f0
ae4bf6f79e226e9a
a07766d1a6388bf4
Worm.Win32.M
abezat.b3
No 5.1.2600.5
512
3.01 Tunisia N/A
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
18

Safe Entries

First Seen: 18 September 2008 at 11:46 am
No. Company File Type SHA1 MD5 Digitally
Signed
File
Version
Product
Version
Submitted
From
1 Microsoft Corporation Executable 8ad2fb466f7c93e0
59ec034101d6573b
6062725f
0999715cd8674c87
9eef6813d445011f
No 4.4.3385 3.01 10.108.55.52/32
2 Microsoft Corporation Executable 6c2ffa284261f2db
e9a8a0a1b5fd741f
aebfa4b8
2686f51ae31e51f8
83930507cac6c14d
No 4.4.3396 3.01 United States
3 Microsoft Corporation Executable 83fefc6d692bcc42
f261cebe7bd6f317
ff9fe9ad
dde2be02a69f0316
23450d89bdf0f9a1
No 5.1.2600.5
512
3.01 Taiwan
4 Microsoft Corporation Executable c5178ac9fa254045
9e7945a1d235c85f
38ea1826
781da7b4e3d8f28e
b8be9184bbd12811
No 5.1.2600.5
512
3.01 10.224.1.117/32
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
 
Exclusive Offer
Get Free Endpoint Protection
Get Advanced
Endpoint
Protection

Award-Winning Security to Protect Your Clients from Cyber Attacks

Comodo Internet Security Pro

Free Antivirus protection from hackers! Get the ultimate Antivirus solution to keep your PC clean and to remove viruses from a slow or infected PC. Improve the PC performance at home or use it on-the-go!

Get Comodo Internet Security Comodo Internet Security