Home / Spyware Encyclopedia / Trojan.PEF13C.oig << Back

Recommendation to Automatically remove Trojan.PEF13C.oig


Our products can remove Trojan.PEF13C.oig and thousands of other Virus and Spyware automatically and instantly.

Trojan.PEF13C.oig Details


  • Category Trojan
  • Discovered 7/24/2013 12:13:52 AM
  • Modified 2/27/2014 12:30:04 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d25339d3b60c99d83984ddbd4e7cbe85.vir.exe 808490  d25339d3b60c99d83984ddbd4e7cbe85 
10826ce0ae926967a29cf944936b7eae.vir.exe 770170  10826ce0ae926967a29cf944936b7eae 
16e65defc3b6207a05950b7a491c74ef.vir.exe 684432  16e65defc3b6207a05950b7a491c74ef 
8e64b5705d1455f3bf3251eb93585fc6.vir.exe 940266  8e64b5705d1455f3bf3251eb93585fc6 
1ad2d0200582e69346f6b852f48b1539.vir.exe 806652  1ad2d0200582e69346f6b852f48b1539 
1737360109124337620aafb372275cc849a8242e87e5a583edafd0b9280560b95aaf851e80fbffd79d1e02c0fbe00.exe 2931305唯一登陆器专用版1.0.0.03a20e70f5f15b4e673e8038b8efc6b0c 
15463405627a813eb16c64bb19a85226233c43705b9311e2f590f72b510cc27e5c80e4cb014bd9617b679bb45187b.exe 1556480  22328d48e167887d337c73b3efa382a4 
46faba92686f29499861181c4d776eb0.vir.exe 765483  46faba92686f29499861181c4d776eb0 
edbfbbb6db2a1d3132e2883cc2eba9ef.vir.exe 867088  edbfbbb6db2a1d3132e2883cc2eba9ef 
8910372092ee77066873ad13894667f4.vir.exe 830530  8910372092ee77066873ad13894667f4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware