Home / Spyware Encyclopedia / Trojan.VBKrypt.cdmh << Back

Recommendation to Automatically remove Trojan.VBKrypt.cdmh


Our products can remove Trojan.VBKrypt.cdmh and thousands of other Virus and Spyware automatically and instantly.

Trojan.VBKrypt.cdmh Details


  • Category Trojan
  • Discovered 5/3/2024 2:25:43 PM
  • Modified 5/3/2024 3:41:44 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fb0cd219d4c14c00a2a9f017054a97194cab5371.bin.exe 1774152  bcaaef59de582858667cd59af38779a311/04/2024
379cd5097b4c6e1b68897126433f267eb664a873.bin.exe 344130  dd9a1e23db4b66992b637b741a3495b418/04/2024
705e48acd3305f7bfdd8dec2c57e69b60d60d825.bin.exe 344148  10c91bb41a674db4c1be7f7fca80c9be18/04/2024
4b86c65865b089446d82f936a2e6f5b0.vir.exe 344157  4b86c65865b089446d82f936a2e6f5b022/04/2024
dfb1d181ff73ef7d555ceda6694d7b30.vir.exe 344136  dfb1d181ff73ef7d555ceda6694d7b3024/04/2024
232a9d0127a0c8107b6c863f432f5933.bin.exe 344151  232a9d0127a0c8107b6c863f432f593315/04/2024
ad8cf41a7fa9822cf01e94c26cada4ec 1654820EQEYBQNLZ8.04.0021ad8cf41a7fa9822cf01e94c26cada4ec02/06/2023
fc1cbc975c34a864b5fea24f594e441e.exe 1654787EQEYBQNLZ8.04.0021fc1cbc975c34a864b5fea24f594e441e 
c82007dff8a727b31d130f1696f31f70.vir.exe 344136  c82007dff8a727b31d130f1696f31f7022/04/2024
9b53f8b6fd0434f53029a49a89d7cda4e858c90a.bin.exe 344133  a25144b9bf1f4faafbf59aa29d9064a218/04/2024

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware