What is registry.exe?
registry.exe is a legitimate executable file developed by Sage KHK Software. This process is known as Sage Registry Service and it belongs to product Registry Module. It is commonly stored in C:\Program Files. Cybercriminals find a way out to mimic malicious programs in the name of registry.exe to spread malware infection.
Affected Platform: Windows OS
How to detect whether your system is affected by registry.exe ?
Viruses can easily affect and corrupt “.exe” files causing several system malfunctions. Below are the symptoms to check if your system is infected with the malware:
- Problem during computer startup.
- Problem during program startup.
- Errors while running specific functions.
- Damaged and missing link files.
- Conflict in the process.
- Missing or corrupted driver files.
- Invalid Windows registry.
- Hardware malfunction.
- Go to Task Manager by pressing the combination of keys CTRL+ALT+DEL.
- Go to the process tab and right-click on the registry.exe file and open its location.
How does Comodo Antivirus help you to protect your system from registry.exe malware?
Comodo Antivirus protects your system from malware attacks and also removes any existing infections. Following are the steps to effectively purge out the registry.exe malware from your system.
Step 1: Download and install Comodo Antivirus.
Step 2: Installation configuration frames will be displayed. Select the configuration you would like to apply.
Step 3: Select Customize Configuration option and arrange installers, configuration, and file location.
Step 4: Restart your PC.
Step 5: Wait until the Comodo Internet Security updates the antivirus.
Step 6: Initiate a quick scan that instantly begins after the update.
Step 7: If the system is infected with registry.exe malware or any other threats, you will be prompted with an alert screen upon scanning.
Step 8: Comodo Antivirus will remove registry.exe malware from your computer including all other malwares!
No. | Company | File Type | SHA1 | MD5 | Malware Name |
Digitally Signed |
File Version |
Product Version |
Submitted From |
Malware Behavior |
---|---|---|---|---|---|---|---|---|---|---|
1 | N/A | Executable | bb22250f78db726f 0ac557d7b1482672 dbc8ff79 |
ecf9489189f0f7c2 b102b8eea850d335 |
TrojWare.Win 32.Hupigon.o gkx |
No | N/A | N/A | ![]() |
N/A |
2 | N/A | Executable | bdd2708b9e110467 08ef6cb7b50d8240 7d88abef |
9462f93d9c68482f 101134d76767c5ac |
TrojWare.Win 32.Wapomi.AQ C |
No | 1, 0, 0, 1 | 1, 0, 0, 1 | ![]() |
N/A |
3 | ESET Smart Security | Executable | bec6db2abd4c7315 b2a3b96ab11726b2 81658510 |
80c7f7be7ef7f46d c78e2364bad4ca28 |
TrojWare.Win 32.UMal.~A |
No | 7.0.302.0 | 7.0.302.0 | ![]() |
N/A |
4 | NULL | Executable | 6dd4d1f921ff7836 e41ec66153113098 0ef40fd5 |
e8c469e2929c1908 7358e7cc59c95b9c |
Unclassified Malware |
No | 0.0.0.0 | 0.0.0.0 | ![]() |
N/A |
No. | Company | File Type | SHA1 | MD5 | Digitally Signed |
File Version |
Product Version |
Submitted From |
---|---|---|---|---|---|---|---|---|
1 | N/A | Executable | 29c41084069cc965 3f656f7f7ca059d9 3007ceb2 |
6a405737862639ea 7e7803e69046c965 |
No | N/A | N/A | ![]() |
2 | N/A | Executable | 2fda5bc04fac0b19 f35415e0166f1d4d c12cc209 |
1b9489b908f32dbc 5fb31061cf2c88fa |
No | N/A | N/A | ![]() |
3 | chenhui530 | Executable | 573f070a16799e86 5194835cbf978788 977fdbdd |
300ff78e6d25b56c f30b8a25c0d16316 |
No | 1.00 | 1.00 | ![]() |
4 | N/A | Executable | db712e365f6d08fe 7b766e2d7c5482cc 1f51c80d |
66f2633500bb86a5 79caf05f9e76b3e3 |
No | 1, 0, 0, 1 | 1, 0, 0, 1 | ![]() |