Home / Spyware Encyclopedia / Trojan.Ekstak.a << Back

Recommendation to Automatically remove Trojan.Ekstak.a


Our products can remove Trojan.Ekstak.a and thousands of other Virus and Spyware automatically and instantly.

Trojan.Ekstak.a Details


  • Category Trojan
  • Discovered 9/13/2018 2:49:54 PM
  • Modified 4/25/2024 11:34:48 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
992a061e91d862a858f9e4fb8ef6cc662720e44a993ee8b5fa24fe70e8b41554.exe 3166672kdesktop Ltd6.33.0.61301c1acc984ca0fa8ae7769d311a230b63 
998ce486b8f0bf97a72a4d96ff3a2fee.exe 3101632  998ce486b8f0bf97a72a4d96ff3a2fee 
90acd9c6520207ef09c9a0316fccae21.exe 2716608Systems Incorporated2.0.0.163s90acd9c6520207ef09c9a0316fccae21 
914b97defdd3f2bceb5b5193ccb0ef01.exe 2716608Systems Incorporated2.0.0.163s914b97defdd3f2bceb5b5193ccb0ef01 
4b30d64c7d937e8700cc2cd14d1aab1a.exe 2716608Systems Incorporated2.0.0.163s4b30d64c7d937e8700cc2cd14d1aab1a 
9c5745871d07e5ef0e7a507c69cdb8cb.exe 2716608Systems Incorporated2.0.0.163s9c5745871d07e5ef0e7a507c69cdb8cb 
86686ed1f9383ccca7e63e828079d92e8da9ac6e1778a6a6d67eb9ee286f3e70.exe 2716608Systems Incorporated2.0.0.163s8ccab5449f847435119c813fc8e5b803 
7d5c4789450c9654cdbe800202301a60.exe 2716608Systems Incorporated2.0.0.163s7d5c4789450c9654cdbe800202301a60 
655565a660d86e5475f9096b83d9670812f47c8ac974bec5f8d98e0a8aff5b90.exe 2716608Systems Incorporated2.0.0.163s604924cffabc4fe90a16af5e307a325a 
6c8819064bd323c5a16e426d95a59fc1.exe 2716608Systems Incorporated2.0.0.163s6c8819064bd323c5a16e426d95a59fc1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware