Home / Spyware Encyclopedia / Trojan.Ekstak.a << Back

Recommendation to Automatically remove Trojan.Ekstak.a


Our products can remove Trojan.Ekstak.a and thousands of other Virus and Spyware automatically and instantly.

Trojan.Ekstak.a Details


  • Category Trojan
  • Discovered 10/11/2024 5:15:48 PM
  • Modified 10/14/2024 11:32:39 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ab88749b7cfa90b98eb8c8483114e1a9.exe 3101640  ab88749b7cfa90b98eb8c8483114e1a9 
30f30d2755786bae6bef4d579a288965.exe 2671544Systems Incorporated2.0.0.163s30f30d2755786bae6bef4d579a288965 
90acd9c6520207ef09c9a0316fccae21.exe 2716608Systems Incorporated2.0.0.163s90acd9c6520207ef09c9a0316fccae21 
914b97defdd3f2bceb5b5193ccb0ef01.exe 2716608Systems Incorporated2.0.0.163s914b97defdd3f2bceb5b5193ccb0ef01 
4b30d64c7d937e8700cc2cd14d1aab1a.exe 2716608Systems Incorporated2.0.0.163s4b30d64c7d937e8700cc2cd14d1aab1a 
9c5745871d07e5ef0e7a507c69cdb8cb.exe 2716608Systems Incorporated2.0.0.163s9c5745871d07e5ef0e7a507c69cdb8cb 
86686ed1f9383ccca7e63e828079d92e8da9ac6e1778a6a6d67eb9ee286f3e70.exe 2716608Systems Incorporated2.0.0.163s8ccab5449f847435119c813fc8e5b803 
7d5c4789450c9654cdbe800202301a60.exe 2716608Systems Incorporated2.0.0.163s7d5c4789450c9654cdbe800202301a60 
655565a660d86e5475f9096b83d9670812f47c8ac974bec5f8d98e0a8aff5b90.exe 2716608Systems Incorporated2.0.0.163s604924cffabc4fe90a16af5e307a325a 
6c8819064bd323c5a16e426d95a59fc1.exe 2716608Systems Incorporated2.0.0.163s6c8819064bd323c5a16e426d95a59fc1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware