Home / Spyware Encyclopedia / Trojan.generickd.40152815 << Back

Recommendation to Automatically remove Trojan.generickd.40152815


Our products can remove Trojan.generickd.40152815 and thousands of other Virus and Spyware automatically and instantly.

Trojan.generickd.40152815 Details


  • Category Trojan
  • Discovered 9/13/2018 3:03:21 PM
  • Modified 7/25/2023 11:22:03 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f0e2d04298fe4337b06968b8e5d7b173.exe 1660271Microsoft Corporation9908070088eb8d9a7ccc97d9af5de84865373508 
f1385d57b58cb4aa8f8f49d78e43e35d.exe 1853236Microsoft Corporation99080700db8f9d7cd8408c6aa6a490651a270873 
bd5f60e54cc869ff63a6fe1fc8740a11.exe 5351913Microsoft Corporation11.0.5510d92245dcd00d0cb50e8f283c42704541 
2d29cf78195abdf482c8d07a445c4100.exe 4813208Microsoft Corporation2.0.50727.1433 (RED0c7cf7c6ae9d87f5b991b6546033ed23 
f0d52cdecd001a27e7a67f644dab020a.exe 4760353Microsoft Corporation2.0.50727.1433 (RED57c046db76e1205013aef8ecedaf627e 
e5e032427faba9da8a3ca7ce6479a1ed.exe 1193239  f91469c2d34035bea2d78ed338adf08e 
cbb3a4c51bc0c98e7b50a6ccc3136a4e.exe 21217014Microsoft Corporation2.0.50727.1433 (REDeb1dc8f21826d1a5ae40742ce8f50235 
16c42ce20e99fe41f5673b56fbc707e0.exe 4765375Microsoft Corporation2.0.50727.1433 (REDdb1bc43335a0b4f87f96fbd774772d6e 
678f5a78202e6f26b18ab4db9137c108.exe 1142036  b8a651e9056cea75561825676a38007a 
6c79ce1598d02e40932cb24c741fbbc9.exe 4761136Microsoft Corporation2.0.50727.1433 (RED07c4cb3826274c6d48e21574c2119ffa 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware