Home / Spyware Encyclopedia / Trojan.Ekstak.a << Back

Recommendation to Automatically remove Trojan.Ekstak.a


Our products can remove Trojan.Ekstak.a and thousands of other Virus and Spyware automatically and instantly.

Trojan.Ekstak.a Details


  • Category Trojan
  • Discovered 10/11/2024 5:15:48 PM
  • Modified 10/14/2024 11:32:39 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e4635151be592654d1aa347a2236fd20.exe 3236776Piriform Ltd5, 32, 00, 6129e4635151be592654d1aa347a2236fd20 
72a689106ea595c80b193c30b06598b3.exe 3101640  72a689106ea595c80b193c30b06598b3 
782423767b8fa2cdc93936aa13210674.exe 3101640  782423767b8fa2cdc93936aa13210674 
8400f606153b08460a9137934b0477d5.exe 3101640  8400f606153b08460a9137934b0477d5 
940b7799043cf68fbd344101a641854c0ad2eb6934ba86958bebb66bb6fea0ee.exe 2671544Systems Incorporated2.0.0.163s1f02f15164f1f3af8ff1cbdb1f6078f0 
9f08098a15108b227855994389c6eccfeadf230706d53aaf0c17ea8afa685264.exe 2671544Systems Incorporated2.0.0.163s16022a5e143f59ef08c86fbd39ad1cbd 
d14f3366cb86effda32e803070910421eee71c4cb49c64fb249c6f52958bb3f3.exe 2671544Systems Incorporated2.0.0.163sccf765c186379e1f762c48719ebc3ff6 
620007122f2ef32d1e771da16addef521678950503b06ebca5685663fc99cbcc.exe 2716600Systems Incorporated2.0.0.163s3fbae70b6c3f7525dd253f508b493e18 
bd6461657a9a55dbe207026bf19a55ce6108f4ca520f7d192024469b91d43362.exe 2704312Systems Incorporated2.0.0.163sb06554a7a05a79b870fe679507fcb76a 
1db9afd107e90c73429571dfbbdadaf4.exe 2716600Systems Incorporated2.0.0.163s1db9afd107e90c73429571dfbbdadaf4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware