Home / Spyware Encyclopedia / Trojan.VBKrypt.dalu << Back

Recommendation to Automatically remove Trojan.VBKrypt.dalu


Our products can remove Trojan.VBKrypt.dalu and thousands of other Virus and Spyware automatically and instantly.

Trojan.VBKrypt.dalu Details


  • Category Trojan
  • Discovered 4/10/2012 9:15:32 PM
  • Modified 8/11/2023 3:36:29 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
45f8f9566f6f56affcd0f157134b017b.vXE.exe 229376 26.14.003045f8f9566f6f56affcd0f157134b017b11/08/2023
13e245735644f043f5b575336799f49e97eae51c.bin.exe 229376  5319c149abb342f5396c3b439f00596618/04/2023
0064d7d3293ab78f7f0cf670754a9e37.exe 229376 26.14.0030cedcb49f9048589396f82a576af5c3d7 
2ecceac81f6a617b22c91a0395fa74a8.vir.exe 229376 26.14.00302ecceac81f6a617b22c91a0395fa74a8 
8b749d2f53bfdf3aa05a8995dbafd349.vxe.exe 229376 26.14.00308b749d2f53bfdf3aa05a8995dbafd349 
f047fa9dd9fad00c050b13c546174fedb9df76d8f194f7329dc767fa1fc8f746.exe 229376 26.14.003036c123dc753ad3e0d5218f4af9e16ae4 
3186bcc0c73efbae95c065d82dc3ac92.vxe.exe 229376 26.14.00303186bcc0c73efbae95c065d82dc3ac92 
a79cb89df2d4e4c5e6495d97bdfab12a1376bef2cda115e222c2b2cdf77377ab.exe 229376 26.14.00301ff235d64dc304874e318a123ad7f278 
a7d0ded16a2469dd67703426d652d6303d774ed3f7aa5150f504331abb88310c.exe 229376 26.14.003028cec4047e66a3bc77821cae75bbae0f 
45f8f9566f6f56affcd0f157134b017b.vXE.exe 229376 26.14.003045f8f9566f6f56affcd0f157134b017b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware