Home / Spyware Encyclopedia / Trojan.VBKrypt.cdom << Back

Recommendation to Automatically remove Trojan.VBKrypt.cdom


Our products can remove Trojan.VBKrypt.cdom and thousands of other Virus and Spyware automatically and instantly.

Trojan.VBKrypt.cdom Details


  • Category Trojan
  • Discovered 10/24/2024 5:55:17 PM
  • Modified 10/25/2024 5:51:42 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
9a77da8024367876518a867a270559188c2dce8bf652051d470de30d42bdafd2cddca2b9d0246a56baa04dd3d03fcc4376c.exe 1945618 9.13.002561ba9274f44ec387a71d58490ccae54a 
0433ac4566a7fbb1d7647cd0f0fd2328.vxe.exe 282130 9.13.00250433ac4566a7fbb1d7647cd0f0fd2328 
7876dd628171234fe32c4ff008dd9fb3e78bd895f43dafbcde04bba0990feed745469e008fa3adacc59149914660779ea75.exe 1945609 9.13.0025143392a908e6265e31facd9f0bb1e7eb 
eab45666fd50aec4734aea233ae84fc88072d77d81922c5cbc8d1ad61e62df7377635692fd9665c9a811060d117443a3a9e.exe 1945615 9.13.0025642ca6a0fd3cbed80bbd8b342665d93f 
b5ad9501c8335592f50b814bc6b7694d.exe 1933321 9.13.0025b5ad9501c8335592f50b814bc6b7694d 
e456cce0eb5d30249c4e33d3548fdb1c.exe 1933483 9.13.0025e456cce0eb5d30249c4e33d3548fdb1c 
a1ef74bf4f77a4402d0546ee0b3cc060.exe 1933441 9.13.0025a1ef74bf4f77a4402d0546ee0b3cc060 
b7106f1d2adb97a638f0994f62a7c1ad.exe 1933402 9.13.0025b7106f1d2adb97a638f0994f62a7c1ad 
c49471230541ff62a3b3a3854257781a.exe 1933501 9.13.0025c49471230541ff62a3b3a3854257781a 
b17255a09a24d10172382f8acc1ee70d.exe 1933513 9.13.0025b17255a09a24d10172382f8acc1ee70d 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware