Home / Spyware Encyclopedia / Trojan.Yakes.dwsm << Back

Recommendation to Automatically remove Trojan.Yakes.dwsm


Our products can remove Trojan.Yakes.dwsm and thousands of other Virus and Spyware automatically and instantly.

Trojan.Yakes.dwsm Details


  • Category Trojan
  • Discovered 5/6/2019 12:04:42 PM
  • Modified 5/7/2019 1:26:46 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d49679e3238b3a157f261d825587bdb7.vir.exe 218873BitNefender S.R.L.13,0,21,1d49679e3238b3a157f261d825587bdb7 
1a67cadb4ac008ddc34b73c0f4bdfeec.vir.exe 218873BitNefender S.R.L.13,0,21,11a67cadb4ac008ddc34b73c0f4bdfeec 
4f5c84fc2cc135e2fca6a3ae43c4586b.vir.exe 218873BitNefender S.R.L.13,0,21,14f5c84fc2cc135e2fca6a3ae43c4586b 
3e34958a325f1a4fd47b3218dc16ffdc.vir.exe 218873BitNefender S.R.L.13,0,21,13e34958a325f1a4fd47b3218dc16ffdc 
fd3865578edb53658d6a36c3ba2a3d27.vir.exe 218873BitNefender S.R.L.13,0,21,1fd3865578edb53658d6a36c3ba2a3d27 
8ea8bba8abed703085f796eb73392fbd.vir.exe 218873BitNefender S.R.L.13,0,21,18ea8bba8abed703085f796eb73392fbd 
1ec1e356b755a8ec2f2e59a576271296.vir.exe 218873BitNefender S.R.L.13,0,21,11ec1e356b755a8ec2f2e59a576271296 
1fe3426aedd5067bbe2725053e25a01d.vir.exe 218873BitNefender S.R.L.13,0,21,11fe3426aedd5067bbe2725053e25a01d 
35416bb58155489bb0604a0e278b139a.vir.exe 218873BitNefender S.R.L.13,0,21,135416bb58155489bb0604a0e278b139a 
fd6ba3674a4e6bc47b355e507f0c5e76.vir.exe 218873BitNefender S.R.L.13,0,21,1fd6ba3674a4e6bc47b355e507f0c5e76 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware