Home / Spyware Encyclopedia / Trojan.Trojan-FNJO << Back

Recommendation to Automatically remove Trojan.Trojan-FNJO


Our products can remove Trojan.Trojan-FNJO and thousands of other Virus and Spyware automatically and instantly.

Trojan.Trojan-FNJO Details


  • Category Trojan
  • Discovered 9/29/2018 1:10:20 PM
  • Modified 9/21/2022 8:05:02 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
bd1a4e27a50da8b7b854c9d90f87421dde75a722054870f1e58a53356d18b0fb.exe 6656 0.0.0.09e9e8453168a8f391ca2c4d6689273d7 
bbe1626b0e6173953d3357dfc6ced7f14daaf22868c02ea6012d44eec2e27eac.exe 6656 0.0.0.0785a162ff3cd5aef3e5667126e18cc63 
c409a462056e3bde6fd21c0abb134a33.exe 6656 0.0.0.0c409a462056e3bde6fd21c0abb134a33 
b8456b25e616fe61a29e817f17d2b2732fefcc80a1c6d2f7e0cd824a3b8e8308.exe 6656 0.0.0.0a874e260ad851182fb8b97340b3e109d 
b7a1f635fdc9203ffea2e0ae0744216d6b2c79f4a69325129c234d58e09db74f.exe 6656 0.0.0.056773f1c89ca5c97f17fbe7aed989a4a 
ce1c38353ad26a609cf9a1b002e14f2a9dd0bd0eefd3aad32ec582e3965c87be.exe 6656 0.0.0.003ed66a63220d806c76f97ca2c8c522a 
ca074d5785d246edd08941921c3f3283fe3dff3e71b8c015d591685ca24e537b.exe 6656 0.0.0.0a8396ad498921189e2355d6c55afdba2 
cd42f0547de4d517583ebd41b1175c84b2989b01d8bf511de4116fa0bd64089b.exe 6656 0.0.0.0d7232084e451eaf69e81440191b21b9b 
c9ff21cf98e8a89369123ca6c705b71d16f7ad529ce540e884fdc807e5a0faaa.exe 6656 0.0.0.03620963d0c62ea70cb28fb4869fee073 
c98f87e2d9a8ea6999519fe4ac00391d6ab9eabcf94304be3f40fd3fcacdf4f8.exe 6656 0.0.0.0ea84293d21a5ddf4ffc8bfdd87dcc500 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware