Trojan.Regimyk
The browser hijacker and Trojan Trojan.Regimyk downloads malware onto infected computers and also alters the web pages displayed in your browser application. Computer security is usually severely compromised in the process of these two activities, creating other potential vectors for malware attacks. Trojan.Regimyk is particularly known for dropping specific types of Chinese software that can be repackaged for various malicious purposes. If you notice unfamiliar software or files on your computer, you should run a quick scan to see if you need to flush out and delete Trojan.Regimyk along with anything it dropped on the system.
Trojan.Regimyk is an Accessory to the Crimes of Other Malware
The majority of Trojan.Regimyk's hostile actions are standard for Trojan infections, but that doesn't make them any less threatening. Here are some of the confirmed and implied to be highly likely aggressive actions the PC threat Trojan.Regimyk may take:
- Attacks on your security such as your firewall or port settings. Trojans like Trojan.Regimyk can't perform their primary functions without doing this first, and the act of removing your security places your computer in danger of being attacked by pretty much any malware within spitting distance of it.
- Once your security goes down, Trojan.Regimyk will take advantage of this state of affairs to begin dropping more malware on your system. Trojan.Regimyk is especially noted for dropping the WebShield application by KingSoft. This Chinese application is sometimes harmless, but can easily be repackaged for malicious actions like locking your homepage.
- Many Trojans will leave it at that, but Trojan.Regimyk goes one step further – it also hijacks your web browser. Browser hijacks are evident when your browser redirects itself to an unfamiliar website of its own accord. Hijack attempts can be concealed in search results and error messages, and may be used to block websites or expose the user to hostile sites.
Burning the Trojan.Regimyk Down
Instead of opening your gates for this PC threat, repulsing Trojan.Regimyk is the sensible thing to do. Fortifying your computer with updated anti-virus programs and strict browser settings can keep Trojan.Regimyk from infecting you in most cases. Staying away from uncertain file sources and not using links that aren't verified to be safe will do ninety-nine percent of the job of protecting your system, and catching problems like Trojan.Regimyk before their attacks ramp up will often cover the rest.
If you're already locked in a fight with Trojan.Regimyk, you should consider time a critical factor - waiting allows Trojan.Regimyk to drop more and more malware onto your machine! Make it a thorough and complete sweep when you delete Trojan.Regimyk, since missing accompanying malware can make your efforts wasted.
File System Modifications
- The following files were created in the system:
# File Name 1 %UserProfile%\Application Data\kingsoft\kws\kws.ini 2 %UserProfile%\Application Data\kingsoft\kws\spitesp.dat 3 %UserProfile%\Application Data\WD\kswbc.dll 4 %UserProfile%\Application Data\WD\kswebshield.dll 5 %UserProfile%\Application Data\WD\KSWebShield.exe 6 %UserProfile%\Application Data\WD\kwssp.dll 7 %UserProfile%\Application Data\WD\KWSSVC.log 8 %UserProfile%\Application DataWD\kwsui.dll
Registry Modifications
- The following newly produced Registry Values are:
HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SOFTWARE\kingsoftHKEY..\..\..\..{RegistryKeys}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Kingsoft Antivirus WebShield Service
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.