Home / Spyware Encyclopedia / Trojan.Yakes.dxih << Back

Recommendation to Automatically remove Trojan.Yakes.dxih


Our products can remove Trojan.Yakes.dxih and thousands of other Virus and Spyware automatically and instantly.

Trojan.Yakes.dxih Details


  • Category Trojan
  • Discovered 1/14/2014 7:46:14 PM
  • Modified 6/28/2014 5:59:05 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
21f57f0c72b42e1ef1e8f8c7c1bc9d50.vir.exe 211112IitDefender S.R.L.13,0,21,121f57f0c72b42e1ef1e8f8c7c1bc9d50 
b628f2b0d156f36a43f684e95db49f72.vir.exe 211112IitDefender S.R.L.13,0,21,1b628f2b0d156f36a43f684e95db49f72 
8fcfa858556b086694f394f502ad7c32.vir.exe 211112IitDefender S.R.L.13,0,21,18fcfa858556b086694f394f502ad7c32 
a097ee3bc865000257ef578b3ce0bf61.vir.exe 211112IitDefender S.R.L.13,0,21,1a097ee3bc865000257ef578b3ce0bf61 
8cc60e3c710bbf9fbec2950c7b542140.vir.exe 211112IitDefender S.R.L.13,0,21,18cc60e3c710bbf9fbec2950c7b542140 
ffcff06d3bab2587a4633f66cd8644e3.vir.exe 211112IitDefender S.R.L.13,0,21,1ffcff06d3bab2587a4633f66cd8644e3 
8f4890a960c665d99db52de0f1baf592.vir.exe 211112IitDefender S.R.L.13,0,21,18f4890a960c665d99db52de0f1baf592 
62e39a585778a9db27627e15f313e120.vir.exe 211112IitDefender S.R.L.13,0,21,162e39a585778a9db27627e15f313e120 
6c142f7cc131a4ea897f4e96e70a4080.vir.exe 211112IitDefender S.R.L.13,0,21,16c142f7cc131a4ea897f4e96e70a4080 
7eccc689f050c6cec115bbec3d159042.vir.exe 211112IitDefender S.R.L.13,0,21,17eccc689f050c6cec115bbec3d159042 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware