Home / Spyware Encyclopedia / Trojan.VBKrypt.cdom << Back

Recommendation to Automatically remove Trojan.VBKrypt.cdom


Our products can remove Trojan.VBKrypt.cdom and thousands of other Virus and Spyware automatically and instantly.

Trojan.VBKrypt.cdom Details


  • Category Trojan
  • Discovered 10/24/2024 5:55:17 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9a77da8024367876518a867a270559188c2dce8bf652051d470de30d42bdafd2cddca2b9d0246a56baa04dd3d03fcc4376c.exe 1945618 9.13.002561ba9274f44ec387a71d58490ccae54a 
0433ac4566a7fbb1d7647cd0f0fd2328.vxe.exe 282130 9.13.00250433ac4566a7fbb1d7647cd0f0fd2328 
b3d0c28dd8624c7e80ad7e9ced53e6b6.vxe.exe 282118 9.13.0025b3d0c28dd8624c7e80ad7e9ced53e6b6 
c8a952ce3b270ee05774a73759a7b10a.exe 1945621 9.13.0025c8a952ce3b270ee05774a73759a7b10a 
70f0b14804d30e780810e0c5fb601633e13b3e95.bin.exe 1945624 9.13.0025ffa3ca036729e01e3506c1bf7fb843b0 
5f759204bedc040cb52e1b8976f5c691.exe 1933315 9.13.00255f759204bedc040cb52e1b8976f5c691 
b5ad9501c8335592f50b814bc6b7694d.exe 1933321 9.13.0025b5ad9501c8335592f50b814bc6b7694d 
da2516917cc7c6b22fc188b58530cb6b.exe 1933492 9.13.0025da2516917cc7c6b22fc188b58530cb6b 
c268039ddb7d24729cc3d726e3040543.exe 1933489 9.13.0025c268039ddb7d24729cc3d726e3040543 
b70dfa3d5e71ba235900e2eda81a657e.exe 1933501 9.13.0025b70dfa3d5e71ba235900e2eda81a657e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware