Home / Spyware Encyclopedia / Trojan.Ekstak.a << Back

Recommendation to Automatically remove Trojan.Ekstak.a


Our products can remove Trojan.Ekstak.a and thousands of other Virus and Spyware automatically and instantly.

Trojan.Ekstak.a Details


  • Category Trojan
  • Discovered 10/11/2024 5:15:48 PM
  • Modified 10/14/2024 11:32:39 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9d01d3b3b5c29edea6e31bb14b7e252633bf2320ff4538b8a529333791a554bf.exe 3166672kdesktop Ltd6.33.0.6130d567f678e5e8625c38d3ad45cdf396cb 
e4635151be592654d1aa347a2236fd20.exe 3236776Piriform Ltd5, 32, 00, 6129e4635151be592654d1aa347a2236fd20 
86612e916b8a7ecd78d8b6f1aa58bf2d.exe 3101640  86612e916b8a7ecd78d8b6f1aa58bf2d 
801fcdb8bf6fa558b0c1709e8fbaa003.exe 3101640  801fcdb8bf6fa558b0c1709e8fbaa003 
98b6c37794194a0cf3bba559cd971a64.exe 3101640  98b6c37794194a0cf3bba559cd971a64 
aba6231bf931bc82cd37d52551463cee.exe 3101624  aba6231bf931bc82cd37d52551463cee 
b184f11de7f0b32d5cac04ef5d1d7b36.exe 3101624  b184f11de7f0b32d5cac04ef5d1d7b36 
b31a9b149d58b1d4a72cc8e20945a04f.exe 3101640  b31a9b149d58b1d4a72cc8e20945a04f 
53ebe00c9054abaad1440d9932c7c4febe2c1dc10bc235566c834a456a3ae667.exe 2704312Systems Incorporated2.0.0.163s1a922a07b2afca113f6a485063a29064 
620007122f2ef32d1e771da16addef521678950503b06ebca5685663fc99cbcc.exe 2716600Systems Incorporated2.0.0.163s3fbae70b6c3f7525dd253f508b493e18 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware