Trojan:Win32/Skeeyah.A!plock

Trojan:Win32/Skeeyah.A!plock Description

The Trojan:Win32/Skeeyah.A!plock detection refers to a security breach caused by a trojan that can be instructed to download and run malware on your PC. Additionally, the Trojan:Win32/Skeeyah.A!plock can be contacted via remote servers and extract files from your system, and it may install a keylogger to steal your banking and social media user credentials. Trojans such as the Trojan:Win32/Skeeyah.A!plock are predominantly deployed via spam campaigns, and web surfers should avoid download of files in spam emails or click on links inside them. Infection with the Trojan:Win32/Skeeyah.A!plock should not be taken lightly because it can expose your OS to other malware and corrupt your installed programs. Additionally, trojans can hijack system resources and insert registry keys in Windows and lock your computer and caution is strongly advised. A reputable anti-malware shield can secure your online activities and protect you from trojans like Trojan:Win32/Skeeyah.A!plock.

Technical Information

File System Details

Trojan:Win32/Skeeyah.A!plock creates the following file(s):
# File Name Size MD5 Detection Count
1 %LOCALAPPDATA%\Microsoft\Redist\VCRedist.exe 133,120 d1ba37ebd08d11409872e8e5872b6abb 734
2 %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\IDMan.exe 755,248 19ecd2966fe29f7e9952dcd89a8bd65a 652
3 %SYSTEMDRIVE%\Users\ganeshGK\AppData\Local\Temp\78B8.tmp.exe\78B8.tmp.exe 335,696 09a357acd6fdadef860bd0d416a67883 58
4 c:\users\lang\appdata\local\temp\subfolders\subfolders.exe 561,152 82a393779547e7c2e647c24cc6f383c3 8
5 %APPDATA%\Oracle\JavaUpdate.exe 230,400 be19910f3c466164d3c444e792cdcf22 5
6 %PROGRAMFILES(x86)%\WindowHosting\WSecurity.exe 505,344 88302a994d6abd92c796677362b495b8 4
7 %WINDIR%\system32\winrm\taskhost.exe 78,848 966b978a9fb85139d305715597ac76ed 3
8 C:\Program Files\Security\Security.exe 931,288 b2a0522844429d41278ae093323bd9db 0
More files

Registry Details

Trojan:Win32/Skeeyah.A!plock creates the following registry entry or registry entries:
Regexp file mask
%ALLUSERSPROFILE%\Dictator\Aladeen.exe
%ALLUSERSPROFILE%\svhostcontroller1.4.2.exe
%ALLUSERSPROFILE%\WindowMan\dwm22.exe
%APPDATA%\Hyphenizes.exe
%APPDATA%\Microsoft\Security\mcrservice.exe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Pro_upg.exe
%APPDATA%\Oracle\JavaUpdate.exe
%APPDATA%\Service Host Network Service.exe
%LOCALAPPDATA%\Microsoft\Windows\vss.exe
%WINDIR%\parameters\hostdll.exe
Directory
%APPDATA%\Security\Files
%APPDATA%\Security\Guard
%APPDATA%\Security\Logs
%APPDATA%\Security\Screenshots
%PROGRAMFILES%\WindowHosting
%PROGRAMFILES(x86)%\WindowHosting
%TEMP%\subfolders

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.