How to Remove “gs.exe”

What is gs.exe?


gs.exe is a legitimate process file popularly known as Greg s Command Shell.  It is associated with software  GS.EXE - Greg s Command Shell developed by unknown. It is located in C:\Program Files by default.

Malware programmers write virus files with malicious scripts and save them as gs.exe with an intention to spread virus on the internet.

Affected Platforms: Windows OS


How to determine if your computer is infected with gs.exe malware?


Look out for the these symptoms to check if your PC is infected with gs.exe malware:

  • Unstable internet connection
  • gs.exe occupies extra CPU space
  • PC processing speed slows down
  • Browser often redirects to irrelevant websites
  • Browser is bombarded with hordes of popup ads
  • Computer screen freezes repeatedly


Take the following steps to diagnose your PC for possible gs.exe malware attack:

Step 1: Simultaneously press CTRL+ALT+DEL keys to open Task Manager.

Step 2: If you notice the file located outside C:\Program Files perform an antivirus scan to get rid of the malware.

How to remove gs.exe malware from system using Comodo Antivirus?

Step 1: Download our award-winning Comodo Free Antivirus

Step 2: Installation configuration frames will be displayed. Select the configuration you would like to apply.

Step 3: Select Customize Configuration option and arrange installers, configuration, and file location.

Step 4: Restart your PC after the installation gets over

Step 5: Wait for Comodo Internet Security to update the antivirus.

Step 6: Proceed with the quick scan that automatically begins after the update.

Step 7: If threats are found during the scanning, you will be notified through an alert screen.

Step 8: Comodo Antivirus will remove gs.exe malware from your computer including all other malwares!

3

Malware Entries

First Seen: 29 April 2012 at 6:47 am
No. Company File Type SHA1 MD5 Malware
Name
Digitally
Signed
File
Version
Product
Version
Submitted
From
Malware Behavior
1 N/A Executable d13ba528cd2ba517
ceca2cb034919c99
4b9e8013
01abd845885a789c
477cf4568863444d
Backdoor.Win
32.Curioso.~
dy02
No N/A N/A Internal Submission N/A
2 N/A Executable 194e37ef6b9cc065
669de7e74f68c093
e1868b56
8d5ae743a46a4ce5
0123261c9b276ca8
TrojWare.Win
32.VB.NMV
No 2.00 2.00 10.224.1.115/32 N/A
3 N/A Executable d13ba528cd2ba517
ceca2cb034919c99
4b9e8013
01abd845885a789c
477cf4568863444d
Backdoor.Win
32.Curioso.~
dy02
No N/A N/A 10.224.1.21/32 N/A
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
36

Safe Entries

First Seen: 05 September 2008 at 1:45 pm
No. Company File Type SHA1 MD5 Digitally
Signed
File
Version
Product
Version
Submitted
From
1 N/A Executable fd45be3885a7d28c
3bb7a57830bdeaba
f2c8492e
de4af10d11dbe711
609ac898532e8753
No N/A N/A Internal Submission
2 AA Executable 6ad7127c82dad537
09732ec7ace704f7
170c9089
86df5929dfc8c4c0
a875631ec0e4ceb9
No 1.00 1.00 Internal Submission
3 Kingsoft Corp. Executable 0f951c10b71259a5
8e97073f2f221d64
14f0b757
e64105071e7a7e66
aada3d6c99d138de
No 3, 0, 0,
30
1.00.00.20
08
10.224.1.116/32
4 Expert System Solutions s.r.l. Executable b97d05013cc75fdb
be1695b086d3b84e
6db6e7aa
6e826bda4ee26809
140eecd0d3fa5bc3
No 332.2007.0
286
332.2007.0
286
United States
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
 
Exclusive Offer
Get Free Endpoint Protection
Get Advanced
Endpoint
Protection

Award-Winning Security to Protect Your Clients from Cyber Attacks

Comodo Internet Security Pro

Free Antivirus protection from hackers! Get the ultimate Antivirus solution to keep your PC clean and to remove viruses from a slow or infected PC. Improve the PC performance at home or use it on-the-go!

Get Comodo Internet Security Comodo Internet Security