Home / Spyware Encyclopedia / Trojan.VBKrypt.cdkr << Back

Recommendation to Automatically remove Trojan.VBKrypt.cdkr


Our products can remove Trojan.VBKrypt.cdkr and thousands of other Virus and Spyware automatically and instantly.

Trojan.VBKrypt.cdkr Details


  • Category Trojan
  • Discovered 4/24/2024 3:18:09 AM
  • Modified 4/24/2024 10:39:28 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
011081bca4b7fa95820f5d41bfae24fedf4e297b138048d384e7c24014ba796c3cc6daa0d2cdac2fe93ed348500754a40ff.exe 2475535Sun Microsystems, Inc.35.35.001227d8ca5be314c5a482eac5051402e61c 
0488cfe25475c703e468bd346b4afff0.vxe.exe 738730Sun Microsystems, Inc.35.35.00120488cfe25475c703e468bd346b4afff0 
2b88b9b02c51c5e30208e3b1d44ec8ed.vxe.exe 738598Sun Microsystems, Inc.35.35.00122b88b9b02c51c5e30208e3b1d44ec8ed 
4c1023eac6c0de35709ce1667c6dcb59.vxe.exe 738631Sun Microsystems, Inc.35.35.00124c1023eac6c0de35709ce1667c6dcb59 
01feb5b441d6dc7787105558f603cc69.vxe.exe 738706Sun Microsystems, Inc.35.35.001201feb5b441d6dc7787105558f603cc69 
66a9ec388921b4ecbfb1bccbefbf82ea.exe 738616Sun Microsystems, Inc.35.35.001266a9ec388921b4ecbfb1bccbefbf82ea 
00bad91d54efe0443d2d3df79c1b1961.vxe.exe 738739Sun Microsystems, Inc.35.35.001200bad91d54efe0443d2d3df79c1b1961 
0578306d883897e8689b00cd46aba308.vxe.exe 738721Sun Microsystems, Inc.35.35.00120578306d883897e8689b00cd46aba308 
685402d402e32fcaac87eeeedb58a682.exe 738568Sun Microsystems, Inc.35.35.0012685402d402e32fcaac87eeeedb58a682 
07b145a0c3922944f20210a6eb439493.vxe.exe 738589Sun Microsystems, Inc.35.35.001207b145a0c3922944f20210a6eb439493 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware