Home / Spyware Encyclopedia / Trojan.Generic << Back

Recommendation to Automatically remove Trojan.Generic


Our products can remove Trojan.Generic and thousands of other Virus and Spyware automatically and instantly.

Trojan.Generic Details


  • Category Trojan
  • Discovered 11/11/2014 11:46:00 AM
  • Modified 12/16/2017 5:02:16 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATURE
..\Customer Issue\2014\JUNE\20140625\Files\{ba099a85-e825-4802-83e7-d386a5b4a734}.dll 295880TODO: <Company name>2.1.0.20aad1c5daaa1c3b65f2a067ee78fee2a
..\Customer Issue\2014\JUNE\20140625\Files\buzzsearchbaapp.dll 183240  ba1227e2f6944e07118ac6777845389d
..\Customer Issue\2014\JUNE\20140625\IIFiles\hexy.exe 189440  d4c9858e949c368cf6c2c7dfbced18a7
..\Customer Issue\2014\JUNE\20140625\Files\buzzsearch.purbrowse.exe 239048  5ee364834d3715723c08010e71675ead
..\Customer Issue\2014\JUNE\20140625\Files\updatetask.exe 113152  1d915d5e8e564b00c2ac53be2805eb0b
..\Retrieved\Swapnil\26\malware(26).exec.exe 112169  2bb3de39d57d78e6b96834ddee1b7fba
..\Retrieved\Swapnil\26\malware(72).exey.exe 28768  7807c4ae7d63215977c635afc5e6a368
..\Retrieved\Swapnil\26\malware(76).exey.exe 28160  71e8d87138a99ed7d2f107a83ea3dd79
..\Customer Issue\2014\JUNE\20140625\Files\buzzsearchbaapp.dll 183240  ba1227e2f6944e07118ac6777845389d
..\Customer Issue\2014\JUNE\20140625\Files\{ba099a85-e825-4802-83e7-d386a5b4a734}.dll 295880TODO: <Company name>2.1.0.20aad1c5daaa1c3b65f2a067ee78fee2a

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automaticallyby tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Spyware Encyclopedia << Back

Spyware Detector can detect & quarantine this Malware