Home / Spyware Encyclopedia / Trojan.strictor << Back

Recommendation to Automatically remove Trojan.strictor


Our products can remove Trojan.strictor and thousands of other Virus and Spyware automatically and instantly.

Trojan.strictor Details


  • Category Trojan
  • Discovered 6/2/2014 3:00:00 PM
  • Modified 3/13/2024 7:00:43 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
acb9642d4c1aac3b37fe5c4eaa4c8ed735fc74d7.bin.exe 1084416lKDyKbp6.1.10.97fbeb7045c6463885b2d081b18e7aa01 
69c55ccf9adb8a1d43ee0d8cb70831400ef4f0ab.bin.exe 1084928uSkKkvp1.10.10.10a036733cc4686a298483cfbfca1c5aa1 
7d49767fd1cd968fabe93b11a16bb00effa5adb0.bin.exe 3571200ExpertGH.com0.0.0.05adcdd1f9fbd6548b1f21946efa6a0f8 
20202507811ac26e7fbee9f31e5dadda05590640896cb4f65b1ae38fb0c879644df57fc1802f084474eec70e5bda3.exe 908836Andrie Pekalongan1.00cc6b8410b605723b9a6405846b384b39 
b86d0877819037ad83c9b214fcba564187570791.bin.exe 33792  f8f751ca85c2ed34d6ccf6b0b21f7afa 
21193001874e104cbfb97929a8123066a8be57851ed13304e8709f8b353b0bd9b9055e5a0c4cbd6791e729ca5ed41.exe 2669568  963cf2628d46cd1ba2132f521ec28577 
1b90c2af65efdc27d7d726ee8becea6ef112d345.bin.exe 114688Microsoft1.0.0.0cee0a759e40215d7a752273fa284a131 
d83ea292c6ebb93df4f1ed0d51d6cf791facffa9.bin.exe 91136  e449c62bbe519d53a1b278c968fb8f8d 
211957068744f95f80d160a3d5fd789e090cb204f2a6da9ead964adb27e9526b1c07716b1bbcf55c62240953f6af8.exe 1460224Microsoft Corporation6.1.7600.16385 (win613d10801eadc78448cd801c314569fe 
dbserver.exe 460288Max引擎1.0.0.10553c463dac7e6466fb3bc4ae6ee0c69 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware