Quantcast
Viewing all articles
Browse latest Browse all 38585

TERMS.EXE is Trojan Staser

We checked some samples of TERMS.EXE and detected the file TERMS.EXE as threat.
Remove the TERMS.EXE file from your computer right now.
Removal tool: http://www.unhackme.com

Malware Analysis of TERMS.EXE
Full path on a computer: %Program Files Common%\Terms.EXE

Detected by UnHackMe:

Item Name: SuperProServer
Author:
Current Setting: %Program Files Common%\Terms.EXE
Type: Auto Services

Item Name: Terms.EXE
Author: Unknown
Related File: %PROGRAM FILES COMMON%\TERMS.EXE
Type: Running Processes

Removal Results: Success
Number of reboot: 1

TERMS.EXE is known as:

Trojan.Staser, Trojan.Zbot, Trojan.Staser.vmu, TrojWare.GameThief.Magania.~NWABI, Trojan.DownLoader9.37712, TR.Zusy.86101.2, Trojan.Staser.hw, Trojan.Staser, Troj.Staser.v.(kcloud), Trojan.Sisproc, Trojan.A.Staser.28672.A, Packed.PePatch, BScope.Trojan.Agent, a variant of Win32.TrojanDownloader.Agent.AJZ, W32.Staser.AJZ.tr, Trojan.Staser.aFea, Win32.Trojan.0e7

TERMS.EXE hash:

  • MD5: 60f5139bd6afd7365a2cb786b30b684e
How to quickly detect TERMS.EXE presence?
Image may be NSFW.
Clik here to view.
Registry:
  • HKLM\System\CurrentControlSet\Services\SuperProServer\ImagePath: “%Program Files Common%\Terms.EXE”
  • HKLM\System\CurrentControlSet\Services\SuperProServer\DisplayName: “SuperProServer”
Image may be NSFW.
Clik here to view.
Files:
  • %Program Files Common%\Terms.EXE


Viewing all articles
Browse latest Browse all 38585

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>