Home / Spyware Encyclopedia / Trojan.Llac.jrdy << Back

Recommendation to Automatically remove Trojan.Llac.jrdy


Our products can remove Trojan.Llac.jrdy and thousands of other Virus and Spyware automatically and instantly.

Trojan.Llac.jrdy Details


  • Category Trojan
  • Discovered 1/27/2015 11:27:46 PM
  • Modified 3/13/2015 11:41:35 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9898bf5e15f66409bfebe140ddf9b6c6.vir.exe 323095FastStone Soft8.0.0.09898bf5e15f66409bfebe140ddf9b6c6 
738e7413a83773d0a4d68e0b4ce842a2.vir.exe 309249FastStone Soft8.0.0.0738e7413a83773d0a4d68e0b4ce842a2 
0bf3f70964dd0c45f3b1f45f807c2b66.vir.exe 331287FastStone Soft8.0.0.00bf3f70964dd0c45f3b1f45f807c2b66 
2a2f68830d987b766c22821661ebbf2a.exe 40960FastStone Soft8.0.0.02a2f68830d987b766c22821661ebbf2a 
13ca72cfc4d6bdc76ef2e31e45069859.exe 335559FastStone Soft8.0.0.013ca72cfc4d6bdc76ef2e31e45069859 
3d9225833e744fb7a7f2afa121ad3250.vir.exe 70679FastStone Soft8.0.0.03d9225833e744fb7a7f2afa121ad3250 
7ffd6604d5fa27b8a855f4dd6e7ea7b9.vir.exe 836611  7ffd6604d5fa27b8a855f4dd6e7ea7b9 
6d1031a2fb796e54ec669e3c58046461.vir.exe 166935FastStone Soft8.0.0.06d1031a2fb796e54ec669e3c58046461 
d2fa3eb5937e843eb2143f6c1199a1bc.vir.exe 330263FastStone Soft8.0.0.0d2fa3eb5937e843eb2143f6c1199a1bc 
f1428eceb2c760f1a9e762050c2d8f45.vir.exe 331799FastStone Soft8.0.0.0f1428eceb2c760f1a9e762050c2d8f45 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware