Home / Spyware Encyclopedia / Trojan.Small.cpl << Back

Recommendation to Automatically remove Trojan.Small.cpl


Our products can remove Trojan.Small.cpl and thousands of other Virus and Spyware automatically and instantly.

Trojan.Small.cpl Details


  • Category Trojan
  • Discovered 4/23/2018 5:49:39 PM
  • Modified 4/25/2018 10:45:24 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATURE
..\Download data\20131017\samples\exe32\virussign.com_077f884f240ae0af47f41d4deb52e920.vir.exe 23690  077f884f240ae0af47f41d4deb52e920
..\Extracted Data\20131022\samples\exe32\virussign.com_4c0e0270d2a30a9e5b843bd0b8677f86.vir.exe 23700  4c0e0270d2a30a9e5b843bd0b8677f86
..\Madhuri\Virussign\Extracted Data\20131122\samples\exe32\virussign.com_567175ebf76c0e966c3fc8be88ea47c0.vir.exe 23928  567175ebf76c0e966c3fc8be88ea47c0
..\b8d570832de7c928122878105716688e.exe 28672  b8d570832de7c928122878105716688e
..\c3d8d15a60f2af4392d9523f6565bce4.exe 28672  c3d8d15a60f2af4392d9523f6565bce4
..\cbf42b98bf55c530c925a9b72af3785d.exe 28672  cbf42b98bf55c530c925a9b72af3785d
..\d10e0fffc61b355d458e1d334db317e1.exe 28672  d10e0fffc61b355d458e1d334db317e1
..\aec4726d9b70b134db452512737f3279.exe 30366  aec4726d9b70b134db452512737f3279
..\ab44a3333686f175a0cff3960a421b2f.exe 30366  ab44a3333686f175a0cff3960a421b2f
..\bd702d29cf5e34ab81a647ab52d65c11.exe 28740  bd702d29cf5e34ab81a647ab52d65c11

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automaticallyby tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Spyware Encyclopedia << Back

Spyware Detector can detect & quarantine this Malware