Home / Spyware Encyclopedia / Trojan.VBKrypt.cdom << Back

Recommendation to Automatically remove Trojan.VBKrypt.cdom


Our products can remove Trojan.VBKrypt.cdom and thousands of other Virus and Spyware automatically and instantly.

Trojan.VBKrypt.cdom Details


  • Category Trojan
  • Discovered 10/24/2024 5:55:17 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
22cb77ec250f662cca730e45dd5c1d310ff0f42c8b86f2cd3d7a797c39d1af9fe130f8a52288c4ac2f1c95c7d9eb035e4c5c2c06c672831dd9e0a9b4722cd50b.exe 1945606 9.13.002555d66e18d1a5de3177661ac1d0ef4246 
4c0225cc957902e01cd43d6bf8294496.vxe.exe 282124 9.13.00254c0225cc957902e01cd43d6bf8294496 
da49991531fbf5b16d9066b3d4f712f8.exe 1945609 9.13.0025da49991531fbf5b16d9066b3d4f712f8 
336c6d5f983d58b4e5f7d70b31763d4adbd6cf20634eecefcec29d85e04946e82c1df7b0864ca4c84a6dd3b92802835ac58.exe 1945627 9.13.0025ddd6844125d0a0539ea407fd9b1a7758 
70f0b14804d30e780810e0c5fb601633e13b3e95.bin.exe 1945624 9.13.0025ffa3ca036729e01e3506c1bf7fb843b0 
5f759204bedc040cb52e1b8976f5c691.exe 1933315 9.13.00255f759204bedc040cb52e1b8976f5c691 
e0c3876753c8fcf7091564327e36b70c.exe 1933564 9.13.0025e0c3876753c8fcf7091564327e36b70c 
6fc56fd2a90029eb667b4ae5fc5d82eb.exe 1933573 9.13.00256fc56fd2a90029eb667b4ae5fc5d82eb 
e5521f1d4b8bc6441106c66a19e59d21.exe 1933471 9.13.0025e5521f1d4b8bc6441106c66a19e59d21 
d5522b18326f818c1dc82538df91ae9e.exe 1933456 9.13.0025d5522b18326f818c1dc82538df91ae9e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware