Quantcast
Channel: How to Remove Malware
Viewing all articles
Browse latest Browse all 38585

TERMS.EXE is Trojan Staser

$
0
0

We checked some samples of TERMS.EXE and detected the file TERMS.EXE as threat.
Remove the TERMS.EXE file from your computer right now.
Removal tool: http://www.unhackme.com

Malware Analysis of TERMS.EXE
Full path on a computer: %Program Files Common%\Terms.EXE

Detected by UnHackMe:

Item Name: SuperProServer
Author:
Current Setting: %Program Files Common%\Terms.EXE
Type: Auto Services

Item Name: Terms.EXE
Author: Unknown
Related File: %PROGRAM FILES COMMON%\TERMS.EXE
Type: Running Processes

Removal Results: Success
Number of reboot: 1

TERMS.EXE is known as:

Trojan.Staser, Trojan.Zbot, Trojan.Staser.vmu, TrojWare.GameThief.Magania.~NWABI, Trojan.DownLoader9.37712, TR.Zusy.86101.2, Trojan.Staser.hw, Trojan.Staser, Troj.Staser.v.(kcloud), Trojan.Sisproc, Trojan.A.Staser.28672.A, Packed.PePatch, BScope.Trojan.Agent, a variant of Win32.TrojanDownloader.Agent.AJZ, W32.Staser.AJZ.tr, Trojan.Staser.aFea, Win32.Trojan.0e7

TERMS.EXE hash:

  • MD5: 60f5139bd6afd7365a2cb786b30b684e
How to quickly detect TERMS.EXE presence?
Registry:
  • HKLM\System\CurrentControlSet\Services\SuperProServer\ImagePath: “%Program Files Common%\Terms.EXE”
  • HKLM\System\CurrentControlSet\Services\SuperProServer\DisplayName: “SuperProServer”
Files:
  • %Program Files Common%\Terms.EXE


Viewing all articles
Browse latest Browse all 38585

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>