Home / Spyware Encyclopedia / Trojan.Needy.c << Back

Recommendation to Automatically remove Trojan.Needy.c


Our products can remove Trojan.Needy.c and thousands of other Virus and Spyware automatically and instantly.

Trojan.Needy.c Details


  • Category Trojan
  • Discovered 4/4/2011 3:24:14 AM
  • Modified 2/22/2019 12:31:33 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f780d2f867dca9dee36ad9cd8708ab258acbe94fd7e2646ee8902d5a0b847987 1397  598674a24480b5b0d1ea929d6f6d2d07 
e420554c80cc224645270c6b2bd09433 4348  e420554c80cc224645270c6b2bd09433 
4211b7bca4086fa4836edf41361f582d4f5b815d1ffc569c1c2b9923a07f40ee 1397  13a5a5170cd0506eeb885a7b68997d6f 
8a1254d049f202254dfe11c5f89e254647bd6909638f6454192dfc353babb9e2 1397  4950d74bb2b1a553e55b3cd56fbb184a 
8b937180f4d004b4fa23a07cf7e6a311.vir 4054  8b937180f4d004b4fa23a07cf7e6a311 
5d2c9f413c31f52ec93d8c5adf6ec8f88087b37cb63ab9d78ea60f7c1d7ed8aa 1397  7731823dd5f571f94fbb98f1a20c6972 
10c822baec05e96f67f0825ee332d110.vir 1398  10c822baec05e96f67f0825ee332d110 
881f90294625f724d76cf72ab748eaac.vir 4324  881f90294625f724d76cf72ab748eaac 
d59c54f188fcab28e469494a13b9dc1a 1398  d59c54f188fcab28e469494a13b9dc1a 
0452bd215120709dec89a584e827c8d91d38f56835659e40740b5658edb65114 1397  ab1c77ee314b0453c562aaee9939f3f6 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware