Home / Spyware Encyclopedia / Trojan.Amonetize << Back

Recommendation to Automatically remove Trojan.Amonetize


Our products can remove Trojan.Amonetize and thousands of other Virus and Spyware automatically and instantly.

Trojan.Amonetize Details


  • Category Trojan
  • Discovered 10/11/2013 12:30:42 PM
  • Modified 3/22/2024 5:03:09 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e9be94efc910cf2b5325fed2d69e662ee10b9868215abfe1bb3e5e3da23e93b7.exe 283352  a1e6ae32e99027b2c36a6ab800d9879f 
403a974c162442df742eac614e6885b9f614ba259890b80f13d28849088542b2.exe 205416  3a9472703bc7c725cfbebbe7990d4ecb 
b387fcfcc6a9792cafe2e253d838ae916c6f191f21d15f0c5354ce3a13c9cffc.exe 205464  24da45486f90df78cfc84ce373debc8b 
be7e5fcf58d443ddf61d932c7c1802cef920994d8a70341ee1222952298eab8e.exe 205504  8acc23ab3627741c043021e53ca741a4 
8d39fd7336d10ad9d2076cbbce61819ac30bfc60782090dc3d62be17484cc7b9.exe 205424  dbcc435696faada0ed1aa5340b8f9016 
67fd22d07e1ca827c0fc0a658acb678b5ddcab11314bcab7759a581ba307f896.exe 205400  759cb08000bd2169e928c4aa96ccb3eb 
special_26_2013_hindi_720p_dvdrip_x264_hon3y.exe 205624  5442ca194ffe0b167a1ff5091f2e44cc 
34d82183435fbef08b4c511d889bc4a2.vir.exe 205608  34d82183435fbef08b4c511d889bc4a2 
570e6f6b201573f54d37c5d83efcdb7ac3ffbf58da8147ad3ff027615cffffab.exe 194142  bf13bb10432e8150b907e3106f62f717 
170607046962792e81fbe00444e14d793f48c46d41dcf3b5f3968dc3de85d64cdedaefc282cd0f7e658398277c47f.exe 704664  f5c48730ce1df6d0b4c210cfc0e3c9cf 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware