Home / Spyware Encyclopedia / Trojan.Yakes.sptt << Back

Recommendation to Automatically remove Trojan.Yakes.sptt


Our products can remove Trojan.Yakes.sptt and thousands of other Virus and Spyware automatically and instantly.

Trojan.Yakes.sptt Details


  • Category Trojan
  • Discovered 8/27/2024 9:09:54 PM
  • Modified 8/28/2024 11:34:40 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5f47c7f43327592b71fa98d9ff528cc7.exe 604672Microsoft Corporation6.00.2900.2180 (xps5f47c7f43327592b71fa98d9ff528cc7 
d9905fc2270608b027443e8ffd3672ab.exe 930304Microsoft Corporation6.00.2900.2180 (xpsd9905fc2270608b027443e8ffd3672ab 
806856034cf7f1bc155cbfa2c4e21e9f.exe 461763 1, 0, 0, 1806856034cf7f1bc155cbfa2c4e21e9f 
8bfc0f0f2200e8e1614b64f82ca18423.exe 3491115 1, 0, 0, 18bfc0f0f2200e8e1614b64f82ca1842315/11/2019
6e974bf251fdea8c443d92725097a490.vir.exe 685568  6e974bf251fdea8c443d92725097a49009/03/2022
820e096c3de568971019231894087f9563a71dcfc5b54169c7e1ce9c641c6b77.mrg.exe 326144  dd0b255b6454b459b47b91608b05af6326/03/2022
bc19f25e5866a37db9617632ae33cac461c66d4962c88ec2e27ef290f5a3018c.mrg.exe 315392  4788f0d8dbf4c37b14158a533e347b6f31/08/2022
1cccb71e805596d423f00298990ad3533e81a9b2276487e4538695d9ffa74a6e.mrg.exe 451072  b2f512f8dc3d1e6767ca56de49ba9b3320/09/2022
c2256f3e08fc000146513a7860a8b73e.exe 1196032  c2256f3e08fc000146513a7860a8b73e17/01/2023
8c99632b13a4f3239fc6c98efee59cd7b17570a28f5bdda8f363c800961c5864[1].exe 311808  1ab7716e25310894f60e1a2e06aab4b225/01/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware