Home / Spyware Encyclopedia / Trojan.Qshell << Back

Recommendation to Automatically remove Trojan.Qshell


Our products can remove Trojan.Qshell and thousands of other Virus and Spyware automatically and instantly.

Trojan.Qshell Details


  • Category Trojan
  • Discovered 4/7/2024 12:51:55 AM
  • Modified 4/8/2024 10:30:56 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
bafacc48fef0638718831d5682cceb23e841acbad7598e8ca1a1218e0c34b290_sample.exe 408064  be0594556cf6675d2fd18198e7e7c9fd22/12/2020
7d7e072bb85d79e5c11cc621b46b062d1a3c0b1e67118071be2fcb47bb3ef3e3_sample.exe 599104  a642e2f3cef8c206359169f043e58ee023/12/2020
1067-532738ae5dc54700988a08285bdae73de277e3be.exe 597568  e268f5e9bb0adfe10302a5b21476834624/12/2020
73f93e62771afd5a30fbbe4f48e0b43779011f9b17a0a068db0b2c705b901ae5_sample.exe 599104  066f58901ae0014ea3a3d264d0b0642525/12/2020
af4c5c956de25c797e7aeabedb14ca32f3f6f507f10c6ae3fe4c3fca8926a5a5_sample.exe 599104  23ccfb6106610ad96ab125f1075898ca25/12/2020
dde4b68f3c066805432f68792183186ce6b5ae576e6581306bfb6a84a4175d21_sample.exe 599104  462060b32cbc92815d3744b3bb5c9eb625/12/2020
4bee697ec5fd4adbb34cc5b3b522c1fb57b9d180b747455e0cc0b0c8a0a3f172_sample.exe 667712  4678fbd3a71b9d4abd486868c1c0d13126/12/2020
d4c4935f79236cde419484c3db5d58b0.vir.exe 764928  d4c4935f79236cde419484c3db5d58b006/01/2021
aca8d8b8226f6c92d6cbb07b079b2bc0.vir.exe 830808  aca8d8b8226f6c92d6cbb07b079b2bc006/01/2021
270a4e6fb2edbc41498ef555a3f07407.exe 1038848  270a4e6fb2edbc41498ef555a3f0740713/01/2021

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware