Home / Spyware Encyclopedia / Trojan.Inject.vcfz << Back

Recommendation to Automatically remove Trojan.Inject.vcfz


Our products can remove Trojan.Inject.vcfz and thousands of other Virus and Spyware automatically and instantly.

Trojan.Inject.vcfz Details


  • Category Trojan
  • Discovered 8/28/2024 2:25:32 AM
  • Modified 8/28/2024 11:36:04 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
virusshare_577403bb79d3875b34e6e6302200dea0.exe 152064  577403bb79d3875b34e6e6302200dea0 
5941e31f96b14e15ecb29206ba2abbbd85a64306914b40d27944027767847d72.exe 384512  b0dea7679c190315b749d75652978ea0 
0ada4fc67c3cc887cbc7c456e1218d6a4d762cc48517764e29d571f027a6bd0a.exe 152064  f2fade47a5e094d15fdfa5550a9af2ca 
66c93c0c128936bfa9cd35a23d8ff921a13062fa8a03e68cb85b8f0d59fa1883.exe 152064  dbf013422a77ef8497bcc8c16f2ccfd0 
b669ebe7ce81f66837c166d0d41e2c9c9a7e25b2d13c6939427b22cb3a7423a0.exe 152064  b73009e29c0c30978da52684fb54a300 
26cb09b4ae1a9445540ac1de4bc815a3c40f8d1a75219bd4fdc16eb53c3e6a43.exe 152064  8b557895118f8633d1922706d88ed480 
2e6fe3ab6950bb47434c3850488e9936.vir.exe 152064  2e6fe3ab6950bb47434c3850488e9936 
07c2a22088e6df23cb985c24004cfe8c.vir.exe 152064  07c2a22088e6df23cb985c24004cfe8c 
8132b32ed853ac96ef867cb49e928f0a.vir.exe 713728  8132b32ed853ac96ef867cb49e928f0a 
c91eeb7d1acf3c77c366dc55c6ad51c2.vir.exe 101931  c91eeb7d1acf3c77c366dc55c6ad51c2 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware