Aliases: No associated aliases
The following free Microsoft software detects and removes the vulnerable certificates from the certificate root store, as well as the affected binaries that might re-install the vulnerable certificate:
Any files that are signed using compromised certificates will also be detected and removed.
You should also run a full scan. A full scan might find hidden malware.
If you’re using Windows XP, see our Windows XP end of support page.