Home / Spyware Encyclopedia / Trojan.application << Back

Recommendation to Automatically remove Trojan.application


Our products can remove Trojan.application and thousands of other Virus and Spyware automatically and instantly.

Trojan.application Details


  • Category Trojan
  • Discovered 1/6/2015 2:12:47 PM
  • Modified 3/27/2024 10:36:55 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
11b28dbb718e346982ff3dbabf530138 20754  11b28dbb718e346982ff3dbabf530138 
3c89830b18878d40122a49af621243a9.exe 1199800Media Finder 3c89830b18878d40122a49af621243a9 
df6c31d8019d22f5b17aa2fcd86097e5.exe 390600Media Finder df6c31d8019d22f5b17aa2fcd86097e5 
afd96a35e53952eecbcbffa579388596e9f9a53e.bin.exe 1050976  db1b96af1c58effe6520b9152ff78197 
b5b336e3d6c2a91e548f091bb952f413f5c789da.bin.exe 601480  567ae99f1e835ef3a8bb8002ceadbaa6 
1e8e389e59966e653e0edd0b3228afef15117818.bin.exe 1050976  b49ee00ddbee63d78582ab59d44456ed 
65874fbac731890c16f86af20d21c3f766659f37.bin.exe 1050976  69025c7cb516f312e71c4b83bacae5f5 
3a2c3d5022aacac6dc5103735cd172001cd5cc66498d70c70fb54077ca3e36201f76d0a846700e33c877fe9dd8dc39d4659.exe 602504  5ace9796c33d22656d3dfea61b161484 
dbd6b39c1b3fe36f994647bfa9b7065ffba2953bb0f11a40d295b5e0d25ec5fac313edbbff212bb27c0de6ce67b2b85b112.exe 1039632  890006020fcbf6fd25ca014f97ea8fd8 
e658d8317d46aab16c74d27f0add2973c403c2e8aa1564416ffef583f4bd3fb63dcb9a564ba90d57ed98a05e026791b654b.exe 585096  1a38cbabcabb2fb75692da64143288bf 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware