Home / Spyware Encyclopedia / Trojan.Babylon << Back

Recommendation to Automatically remove Trojan.Babylon


Our products can remove Trojan.Babylon and thousands of other Virus and Spyware automatically and instantly.

Trojan.Babylon Details


  • Category Trojan
  • Discovered 3/9/2014 8:25:04 PM
  • Modified 2/29/2024 4:57:15 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
eacd4ce7fbfb10ab4a4d9f7a182c0ee1f5e0376dcf9afe87a3d189e12256b9cc.mrg.exe 806632  85e36e816fc7686ea5fb940ba789426a 
e7261570e893adcc22916e325dd1c9d6108e42d7c3db2cb178410d476ddbef0e462d73a0d5a60eed267514436b13c641b71.exe 2056944  e6c47739112fd5b36553320f0094f1be 
baad6fdbb4e3493ffd0ee95d4b1af5ab.exe 1052998BabylonToolbar1.4.19.5baad6fdbb4e3493ffd0ee95d4b1af5ab 
toolbar_traducegratis.exe 1334800BabylonToolbar1.4.19.192ca8b5cd5d2edf2c033db34e7e09dc1d 
f83ba29af5225311b16f12df7bd424a035ceeb572c50445f35f1ea8b616885e9.exe 2054270  144434040f92a860811da6291fd9110b 
28412597e4a96e29b496f3336973629b.exe 1334800BabylonToolbar1.4.19.199f560ecf5753a6d7c000b75ce5086700 
2101250000257832d9ff42796b5b0bad9cec8096abbc6be9c084e4b0e0832232e6eced2af8e37cc61f0c3502619fb.exe 335872BabylonToolbar1.8.3.83afb562e0a3703e7dc934e609d722540 
5a1fd279ba0c39659f6bc4a8845493a6e67364d269b251886fc7f9a198294c3b.exe 203776BabylonToolbar1.8.3.8a3ac8a9ba724da8fa4023b630ec94783 
9732585b6e3982231191e89f94729f51.exe 744264  9732585b6e3982231191e89f94729f51 
e1fd708845b873aeb98d6f70b02a6038b59c0b4d.bin.exe 1665985  a22565f4a2577713bb886e82f86a264a 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware