Home / Spyware Encyclopedia / Trojan.Cometer.gen << Back

Recommendation to Automatically remove Trojan.Cometer.gen


Our products can remove Trojan.Cometer.gen and thousands of other Virus and Spyware automatically and instantly.

Trojan.Cometer.gen Details


  • Category Trojan
  • Discovered 4/18/2024 3:43:00 AM
  • Modified 4/18/2024 3:49:33 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fa849dc840c7b6dacee924a71b31b77d.exe 16384  fa849dc840c7b6dacee924a71b31b77d 
65eacc591fc288fd2c01e9e768104747.exe 73802Apache Software Foundation2.2.1465eacc591fc288fd2c01e9e768104747 
e71eb24e247ece131b18b4aa09d3ff07 73802Apache Software Foundation2.2.14e71eb24e247ece131b18b4aa09d3ff07 
878b356da41d3ddaea8a89bd7567dfea.exe 73802Apache Software Foundation2.2.14878b356da41d3ddaea8a89bd7567dfea 
1282b470c9ad0e4b4864b9988e1b8631.dll 310272  1282b470c9ad0e4b4864b9988e1b8631 
f735facc5a273ab0f5ec4d01bd9575b2.exe 9728Microsoft Corporation6.1.7600.16385 (winf735facc5a273ab0f5ec4d01bd9575b2 
1eb7d406813e237b1bfe1a4f1d912b3c.exe 515584Simon TathamRelease 0.631eb7d406813e237b1bfe1a4f1d912b3c 
c951fb51774612a238d4239ca9f977db.exe 376308  c951fb51774612a238d4239ca9f977db 
947b0a6ca56808ef7c8a8561ed9e43e0.vir.exe 193024Wllulkw gws7.483947b0a6ca56808ef7c8a8561ed9e43e0 
e56dedbee498d34af734fcc668e75ee0.vir.exe 73802Apache Software Foundation2.2.14e56dedbee498d34af734fcc668e75ee0 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware