Home / Spyware Encyclopedia / Trojan.BackDoor-EYG << Back

Recommendation to Automatically remove Trojan.BackDoor-EYG


Our products can remove Trojan.BackDoor-EYG and thousands of other Virus and Spyware automatically and instantly.

Trojan.BackDoor-EYG Details


  • Category Trojan
  • Discovered 8/20/2014 9:02:01 PM
  • Modified 8/29/2015 11:18:12 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ca4349457a3aaf52350762dc2814928c.vir.exe 27648Adobe Systems, Inc.10,1,53,64ca4349457a3aaf52350762dc2814928c 
389eb9dcb5089123eee9d150ae3b4a3b.vir.exe 27648Adobe Systems, Inc.10,1,53,64389eb9dcb5089123eee9d150ae3b4a3b 
a5fcc581b75361e7c0e3ccfca688b30f.vir.exe 27648Adobe Systems, Inc.10,1,53,64a5fcc581b75361e7c0e3ccfca688b30f 
1695334a5f25d34009ff9fb2b6d801bc.vir.exe 27648Adobe Systems, Inc.10,1,53,641695334a5f25d34009ff9fb2b6d801bc 
c29e8a54cd489314c1c5cf680ba2cf8f.vir.exe 27648Adobe Systems, Inc.10,1,53,64c29e8a54cd489314c1c5cf680ba2cf8f 
ea80d7b0822b829e6b3e9791510c6dae.vir.exe 27648Adobe Systems, Inc.10,1,53,64ea80d7b0822b829e6b3e9791510c6dae 
f37490b3ccdc16444eeb3de65abcc544.vir.exe 27648Adobe Systems, Inc.10,1,53,64f37490b3ccdc16444eeb3de65abcc544 
ea7e48cca8bcc824f23d8ba9f0d05fdf.vir.exe 27648Adobe Systems, Inc.10,1,53,64ea7e48cca8bcc824f23d8ba9f0d05fdf 
b1c46e2aa585d79520331491387f0e08.vir.exe 27648Adobe Systems, Inc.10,1,53,64b1c46e2aa585d79520331491387f0e08 
1863f45c1db93b0dd5ecf7223cb2760f.vir.exe 27648Adobe Systems, Inc.10,1,53,641863f45c1db93b0dd5ecf7223cb2760f 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware