Home / Spyware Encyclopedia / Trojan.FakeAV.ahcb << Back

Recommendation to Automatically remove Trojan.FakeAV.ahcb


Our products can remove Trojan.FakeAV.ahcb and thousands of other Virus and Spyware automatically and instantly.

Trojan.FakeAV.ahcb Details


  • Category Trojan
  • Discovered 6/17/2011 7:56:14 PM
  • Modified 8/1/2023 4:13:17 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
cbbca57e3553edcc6249846766c3664910769f43.{pe}.exe 2561  10662f6f33e6e5259e44c39a9065a363 
1d8ee8b5b4d567f994fdd97b339f25f0a75ae965.{pe}.exe 2561  f5c17b898cebd77bae10136d6a56bf1c26/07/2023
8817295ca391cb267aba791f90d19c2d21c296ac.{pe}.exe 240640Корпорация Майкрософт5.1.2600.0527b15c4ff8ee00a46716a4be51630b718/07/2023
e91bee4621609a4bf8cc1827ecf875d6.exe 79941  e91bee4621609a4bf8cc1827ecf875d618/07/2023
af5a1d71912b8fe3a79e0b69ef652944.vir.exe 238592Корпорация Майкрософт5.1.2600.0 (xpclienaf5a1d71912b8fe3a79e0b69ef65294406/12/2022
bfa77b4c2e53161ae6006589e38fa336 2856  bfa77b4c2e53161ae6006589e38fa33602/03/2021
1dae84649175afd5249889ee849a78573563c35d.{pe}.exe 2856  bfa77b4c2e53161ae6006589e38fa33602/03/2021
bfa77b4c2e53161ae6006589e38fa336.exe 2856  bfa77b4c2e53161ae6006589e38fa33602/03/2021
1943e1a17b27a65c09ef0ffa1f2a1e44.vir.exe 2561  1943e1a17b27a65c09ef0ffa1f2a1e44 
f2c959dee55b3fd1db46386a2f92f629.vir.exe 250880  f2c959dee55b3fd1db46386a2f92f629 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware