Home / Spyware Encyclopedia / Trojan.Lethic.gen << Back

Recommendation to Automatically remove Trojan.Lethic.gen


Our products can remove Trojan.Lethic.gen and thousands of other Virus and Spyware automatically and instantly.

Trojan.Lethic.gen Details


  • Category Trojan
  • Discovered 5/14/2018 7:13:49 PM
  • Modified 12/15/2022 8:28:33 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
05e807ac7748038296c3d5e658440ec3.exe 355270  f8d4a2040fe2cf2d300032b0a964800a 
05e807ac7748038296c3d5e658440ec3.exe 355297  c4fd52628e2355a15ab92a2e7a0e64af 
652a15f6fb5703a6d4840fa3d6078c48.exe 355304  c53cbb6b8026c53df850c4ac5d381218 
a0b54775c3dd1047fc5ad68ca4a5f407.exe 180224  a0b54775c3dd1047fc5ad68ca4a5f40715/12/2022
a3b87c5bc7e87680540f927c7754e67f650c89506d6ad00c8abd73061fcbe0f8.exe 267776  7daa7ed2140e54b28507fa8adb4a39ce29/11/2022
62d6427ab4a154bb2d3763dbc7404eb4d117f65bce7d9d5b3ab9fd55249ce6e9.exe 267776  21113701c83dea38886ca8f93a5f16e915/09/2022
45f5f2142f76a1265b1bcdfd19b5d5df1e82f207112c498d700476f6e01be0cf.exe 267776  1e0fc393839b13fecd03d57657dd65cd30/08/2022
eb03866e1369f3014f1c831340b9aa88.exe 355242  62a718d8d22dd6aa74acc34dd4d6edbe 
1259b1cc87d0268800fd84f2f2ec1f33.exe 355244  8716f66ccf9de0ef882a91e59f8eb52d 
8e5c9181c34a7b85dd5bb5af2836d63e.exe 355278  2e32452deeb426b1101e4299ec02c09e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware