Have you used any security programs to find and remove malware? The link for VT certainly identifies the file as malware.
Where it came from....most likely from using a P2P program.
Scan using the programs below.
Download Emsisoft Emergency Kit and save it to your desktop. Double click on EmsisoftEmergencyKit.exe to extract its contents and create a shortcut on the desktop. Leave all settings as they are and click Accept & Extract. A folder named EEK will be created in the root of the drive (usually c:\). .
- After extraction an Emsisoft Emergency Kit window will open. Under "Run Directly:" click Emergency Kit Scanner.
- When asked to run an online update, click Yes.
- When the update is finished, click the Back to Security Status link in the left corner. On the main screen click the Scan Now button.
- Select the malware scan option and click the SCAN button.
- When the scan is finished click the Quarantine selected objects button. Note, this option is only available if malicious objects were detected during the scan.
- Click the View Report button and in the Reports window double-click on the most recent log. Note, logs are named as follows: a2scan_<date>-<time>.txt.
- Copy/paste the report contents in your next reply.
Download Malwarebytes' Anti-Malware from Here
Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).
- Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
- Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
- Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
- Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
- If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
- When MBAM is finished scanning it will display a screen that displays any malware that it has detected.
- Click the Remove Selected button.
- MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so.
- While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
- The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.
POST THE LOG FOR REVIEW.
- Hold down Control and click on this link to open ESET OnlineScan in a new window.
- Click the button.
- For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
- Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
- Double click on the icon on your desktop.
- Click the Start button.
- Accept any security warnings from your browser.
- Under scan settings, check "Scan Archives" and "Remove found threats"
- ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
- When the scan completes, click List Threats
- Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
- Click the Back button.
- Click the Finish button.
- NOTE:Sometimes if ESET finds no infections it will not create a log.
Edited by buddy215, 12 February 2016 - 12:35 PM.