Home / Spyware Encyclopedia / Trojan.Fabookie << Back

Recommendation to Automatically remove Trojan.Fabookie


Our products can remove Trojan.Fabookie and thousands of other Virus and Spyware automatically and instantly.

Trojan.Fabookie Details


  • Category Trojan
  • Discovered 9/19/2024 6:20:27 PM
  • Modified 9/20/2024 10:25:21 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ifhvvyy.exe 4178432  4bbcf64326b38775a9237693aaa4181708/09/2020
c9fa4f969679af00519a105a1e79c667.exe 4653056  c9fa4f969679af00519a105a1e79c66730/10/2020
54350b77ac7fc38bc6bc36b932040c10.vir.exe 3927552  54350b77ac7fc38bc6bc36b932040c1028/11/2020
080971bb7e0cdeea196ac6e5dbc1ea30920f630f.exe 3973632  964b8db7bd096f5be901854370574a4f04/05/2021
trojan.win32.fabookie.tb-31b79e98205350e605d902b12cc0cd86f246a42a44d395baabed114003588977.exe 4324864  3b4c23856d5a45cbe37595a5c2806f8b24/07/2023
f97cfe559565a36185728730c63709bdb40aee21440e839f4692438998835aaa.exe 6778368  05424c2a6455c788fc7eb0ec961ac34601/11/2022
4071a03de1ee13da319f7e208ff11c7b8a0a1563d6980266de4fe5e6bedf5912.mrg.exe 4154880  b57a371384d36a7b33bd92706fabde0405/07/2022
422009406b445b76c952f1175f044e8b4f31d797a72ad26aa4c0c415ff1c2a7f.mrg.exe 5171200  0168eeab2e3da379c37f7c73c7da320d28/06/2022
3612ef24052135b7636c9ec0e30be172e3acf98a7228fa906cc46d0eac57b551.mrg.exe 3911168  d963489c72399d7657efdaf755cc496c28/06/2022
f8a3909c074f812362c6f0bfa2b4ff7a71846c81f3cb3a0ed919c68f2a95117f.mrg.exe 3908096  d7274716663767728b54f82334ca208224/06/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware