Malware.Slackor
Malware.Slackor is a dangerous backdoor trojan infection that can attach to running processes on your computer, install other malware and harm or change important registry files. Malware.Slackor runs in the background and enables remote access to the affected system. Malware.Slackor may make changes to Windows processes with malicious files and other corrupt program codes. Malware.Slackor includes a remote administration tool that can bypass attacker to stealthily monitor a program, computer or even a network.
File System Details
Malware.Slackor may create the following file(s):
# | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|
1. | %Temp%\sys93589.bat | |
2. | %System%\reginv.dll | |
3. | %Windir%\system\sservice.exe | |
4. | %System%\winkey.dll | |
5. | %Windir%\services.exe | |
6. | %System%\fservice.exe | |
7. | %System%\27371_100001367119654_1746_q.jpg | |
8. | %Windir%\ktd32.atm |
Registry Details
Malware.Slackor may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows NT Script Host\Microsoft DxDiag
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}
HKEY_CURRENT_USER\Software\Microsoft\Windows NT Script Host\Microsoft DxDiag\WinSettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer
HKEY_CURRENT_USER\Software\Microsoft\Windows NT Script Host
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.