Home / Spyware Encyclopedia / Trojan.Inject.vcfz << Back

Recommendation to Automatically remove Trojan.Inject.vcfz

Our products can remove Trojan.Inject.vcfz and thousands of other Virus and Spyware automatically and instantly.

Trojan.Inject.vcfz Details

  • Category Trojan
  • Discovered 8/19/2018 4:21:10 PM
  • Modified 8/20/2018 4:42:50 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
..\bbcfe5503db0260fa2927117e951bb45.exe 501080  bbcfe5503db0260fa2927117e951bb45
..\bede23a6539845dd0a0d1a584530542c.exe 501064  bede23a6539845dd0a0d1a584530542c
..\a2446d997c1fd0fe0114facb60ae6739.exe 500616  a2446d997c1fd0fe0114facb60ae6739
..\ed9b87e2e150813dd3118908909ae535.exe 500616  ed9b87e2e150813dd3118908909ae535
..\ExtractedData\20151222.ManuallyDownloads\b669ebe7ce81f66837c166d0d41e2c9c9a7e25b2d13c6939427b22cb3a7423a0.exe 152064  b73009e29c0c30978da52684fb54a300
..\ExtractedData\20151222.ManuallyDownloads\0ada4fc67c3cc887cbc7c456e1218d6a4d762cc48517764e29d571f027a6bd0a.exe 152064  f2fade47a5e094d15fdfa5550a9af2ca
..\a0e8f6a4928789817397d5c6ca925813.exe 500648  a0e8f6a4928789817397d5c6ca925813
..\ExtractedData\20151222.ManuallyDownloads\26cb09b4ae1a9445540ac1de4bc815a3c40f8d1a75219bd4fdc16eb53c3e6a43.exe 152064  8b557895118f8633d1922706d88ed480
..\e5bbbd3edbfc7a5efa4c01c3c1b92ae6.exe 501944  e5bbbd3edbfc7a5efa4c01c3c1b92ae6
..\ba5ba5232c7083cf4ebb4ac2221e386a.exe 501776  ba5ba5232c7083cf4ebb4ac2221e386a

The following Registry Entries were created:

Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automaticallyby tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Spyware Encyclopedia << Back

Spyware Detector can detect & quarantine this Malware