Home / Spyware Encyclopedia / Trojan.Llac.ysl << Back

Recommendation to Automatically remove Trojan.Llac.ysl


Our products can remove Trojan.Llac.ysl and thousands of other Virus and Spyware automatically and instantly.

Trojan.Llac.ysl Details


  • Category Trojan
  • Discovered 4/22/2011 9:26:53 AM
  • Modified 2/26/2024 5:28:06 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c506bc5950f64c1c6f150b4257e1a41172bea288f77ff70e328a1e77ea50ac4f_ok=panda2.exe.exe 76900  039067a3e839d814032c6aa85c441b51 
0ab1bee90073cf54a63d6dde40d0b662a5d7fa570118f08f267c2231ec61fefc_a7m.exe.exe 76929  6ec18c5323beb36db4b4294fff13e59c 
a88a21651364ae3841b5ac023f5954c1.exe 138760  a88a21651364ae3841b5ac023f5954c118/07/2023
3d83b20892beb2b9681a39cfff106379d2e0fa03af0b8b73c6b539971a6df354.exe 305160  8a7090869726a79d7b63f746a6f43c1603/09/2020
9b58e80d8cd057b15492395b3b35a29b.vir.exe 58051  9b58e80d8cd057b15492395b3b35a29b 
a1815029c9190e6fbdd62bd5ba260d7d77607022fd2874058bcf7d1ebd611e69.exe 101688  5685cd548232880aece8712f079cd2d1 
5635ab20ee3f5385a125fc3360cb8049a2d43992.bin.exe 102251  eb3e498b0b2daad1e0c470876944b95f 
ec39321f7a79e1ead77cca16f2e22d2c.exe 528392  ec39321f7a79e1ead77cca16f2e22d2c 
3d83b20892beb2b9681a39cfff106379d2e0fa03af0b8b73c6b539971a6df354.exe 305160  8a7090869726a79d7b63f746a6f43c16 
be4045e5e0c1c9f900377a7585750506.exe 76897  be4045e5e0c1c9f900377a7585750506 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware