Home / Spyware Encyclopedia / Trojan.Ekstak.a << Back

Recommendation to Automatically remove Trojan.Ekstak.a


Our products can remove Trojan.Ekstak.a and thousands of other Virus and Spyware automatically and instantly.

Trojan.Ekstak.a Details


  • Category Trojan
  • Discovered 10/11/2024 5:15:48 PM
  • Modified 10/14/2024 11:32:39 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
a2a8eacc8958db6cc1c63c565ec7f3a5794af6094ce349ed9b7346430aa96d40.exe 3166672iform-zero Ltd5, 32, 00, 61291318d9575fa71e0cc516ec7c4a6898a0 
7f497678180d976ba27b2817e8b8591f.exe 3101632  7f497678180d976ba27b2817e8b8591f 
e4635151be592654d1aa347a2236fd20.exe 3236776Piriform Ltd5, 32, 00, 6129e4635151be592654d1aa347a2236fd20 
6d9f04e66375854a74a04bcdf13919e1.exe 3101640  6d9f04e66375854a74a04bcdf13919e1 
6cfe1361bd2d62b46926819a979d2f80.exe 3101640  6cfe1361bd2d62b46926819a979d2f80 
7fb30171dee18c6164d1e2e28d784146.exe 3101640  7fb30171dee18c6164d1e2e28d784146 
aef12cd5e58351b60e633cdc40bb9853.exe 3101640  aef12cd5e58351b60e633cdc40bb9853 
b1d62005b1762e84f3e6f6f5d283182c.exe 3101640  b1d62005b1762e84f3e6f6f5d283182c 
d14f3366cb86effda32e803070910421eee71c4cb49c64fb249c6f52958bb3f3.exe 2671544Systems Incorporated2.0.0.163sccf765c186379e1f762c48719ebc3ff6 
30f30d2755786bae6bef4d579a288965.exe 2671544Systems Incorporated2.0.0.163s30f30d2755786bae6bef4d579a288965 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware