Home / Spyware Encyclopedia / Trojan.dropper-gen << Back

Recommendation to Automatically remove Trojan.dropper-gen


Our products can remove Trojan.dropper-gen and thousands of other Virus and Spyware automatically and instantly.

Trojan.dropper-gen Details


  • Category Trojan
  • Discovered 3/28/2015 6:58:15 AM
  • Modified 3/26/2024 12:27:50 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
80f61baa71f64a257621b9040e51a8739261fd07b205f8dba013c079201f89302f715e48e1b0c110127a31af7ffcb9f3a13.exe 180031Iobit2.3 Final77bbdb2bde91f0d00149d864b01b3c3b 
7c1591c8ee2b78852e8356c55b817793b179af69.bin.exe 2802538  484504354027a3098bd362d9b7e9c1b7 
1e1697bf3fbf51a3318ca66f14de90d4189b248f.bin.exe 420864  9805a28c7ba1d931b6f8ed091a241a33 
fc0f1b85ffb35f527fe2ba7c10149265466efe4b.bin.exe 46592Microsoft1.0.0.04062a8a974c728085e207b62fe9f403a 
607f79a61f4d27a49b73bd25f951d437.exe 258648  607f79a61f4d27a49b73bd25f951d437 
d9b6b9a86c4e909bee2ba7123d7a773f8a2c6c5b.bin.exe 2016964重庆半泥沙网络信息技术有限公司 32ac1b553d54d91d7fef2720eefddbc1 
e80db90ba453aebcb0dce283e3681b0819aa4c39.bin.exe 348042Infinity-box Team1.10.12cf384fbfead4bc07bc5c06c17289e3f 
279252d674907b7915c99c513c202c790670fe73.bin.exe 416560  25489ad415574040a2a46d6ef3692f8a 
f6419887891fe0d2aba7d1d55a43fe2bec9cd1a8.bin.exe 460800  339d01f118a496e34ddc4992e5d27a48 
219a68eca3a614bd3f8395b4b9cce8a3122cc8e2c0673dc6aadad96e0f3e4736.exe 46308  88914ee20b3873b7f59cc7c50853fcd1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware