Home / Spyware Encyclopedia / Trojan.Fabookie << Back

Recommendation to Automatically remove Trojan.Fabookie


Our products can remove Trojan.Fabookie and thousands of other Virus and Spyware automatically and instantly.

Trojan.Fabookie Details


  • Category Trojan
  • Discovered 9/19/2024 6:20:27 PM
  • Modified 9/20/2024 10:25:21 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
218656017e2cd9b3b47c98d239dae176.exe 4540416  218656017e2cd9b3b47c98d239dae17627/11/2020
54350b77ac7fc38bc6bc36b932040c10.vir.exe 3927552  54350b77ac7fc38bc6bc36b932040c1028/11/2020
f0d29684814fd6a0c8055b6cdbbb2477.exe 4517376  f0d29684814fd6a0c8055b6cdbbb247729/01/2021
08d60184f63bf6e8790cc835bc34edcc34a6b4c7.bin.exe 5161984  22b5532e7800482c97a9e254ed01d71b26/07/2023
4071a03de1ee13da319f7e208ff11c7b8a0a1563d6980266de4fe5e6bedf5912.mrg.exe 4154880  b57a371384d36a7b33bd92706fabde0405/07/2022
9006b0937ce5f9efa2f73b4159f18ad15fb766bef5b45e36da6a7d79f50f0d88.mrg.exe 4517376  fb7fd135324a00593402f3e9316fca7728/06/2022
7051d385801cd77b1934a76e9cea7b5c22ceb0040d3dc842fb3130790eae0442.mrg.exe 4301824  04a732d508b80dd4a8d8c84fdecab35c28/06/2022
69ee4711bc8bcfe4c7a155f2580ad4ec43a89a4f607937a51f3a3eb7c351017f.mrg.exe 4284928  7f6715fdf84a4b02b738881307097c7c28/06/2022
f8a3909c074f812362c6f0bfa2b4ff7a71846c81f3cb3a0ed919c68f2a95117f.mrg.exe 3908096  d7274716663767728b54f82334ca208224/06/2022
56080f5b7ddd174f678fc243fb389b93637e3f99ae8e20a164c3ca2f9158bb44.mrg.exe 4311552  f7f9aa3bec4a730d22747f727e90507921/06/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware