Home / Spyware Encyclopedia / Trojan.generickd.40152815 << Back

Recommendation to Automatically remove Trojan.generickd.40152815


Our products can remove Trojan.generickd.40152815 and thousands of other Virus and Spyware automatically and instantly.

Trojan.generickd.40152815 Details


  • Category Trojan
  • Discovered 9/13/2018 3:03:21 PM
  • Modified 7/25/2023 11:22:03 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
13d3251c29c3f6b0edae69922229bbdc.exe 4869080Microsoft Corporation2.0.50727.1433 (RED624d96acaf691a670fe4996c44988f75 
f0d52cdecd001a27e7a67f644dab020a.exe 4760353Microsoft Corporation2.0.50727.1433 (RED57c046db76e1205013aef8ecedaf627e 
e5e032427faba9da8a3ca7ce6479a1ed.exe 1193239  f91469c2d34035bea2d78ed338adf08e 
8a137091617c99cfab7c20460ef0493e.exe 1252390  15b1ffcdb2e220287e6405504d2e6090 
16c42ce20e99fe41f5673b56fbc707e0.exe 4765375Microsoft Corporation2.0.50727.1433 (REDdb1bc43335a0b4f87f96fbd774772d6e 
7e40feeaec5cca80b1d8ce8e2614437a.exe 1271575  16a5c3f6c4addc00d3056e21ce6e4074 
54e7610783dfb69d6cda472b7b3f9c49.exe 4761684Microsoft Corporation2.0.50727.1433 (RED1d2d7175e087e65bb2b96212e9933b42 
4300174918d18d3a44b7857b170c6bb0.exe 22943904Microsoft Corporation2.0.50727.1433 (RED03f61291693c82f530981f87c3e5ba35 
3722370c54411a9840e1bdab6da2fb27.exe 4761037Microsoft Corporation2.0.50727.1433 (RED4f15e090d6fff465c28efd50edd7929e 
239e6d82b20bfc7513b0eaa90ba85ebb.exe 4762050Microsoft Corporation2.0.50727.1433 (RED71198bb93d9b1d604c91fc84c6633e41 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware