Home / Spyware Encyclopedia / Trojan.Small.cox << Back

Recommendation to Automatically remove Trojan.Small.cox


Our products can remove Trojan.Small.cox and thousands of other Virus and Spyware automatically and instantly.

Trojan.Small.cox Details


  • Category Trojan
  • Discovered 9/16/2024 4:16:28 PM
  • Modified 9/18/2024 10:18:35 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ee52c03e61e84ee4972009d784bfb0ee2a2946c3.bin.exe 99328  a64a2567f97e602af15c4a827c852d9e 
a2265957002fd70cb003af3dc6fe702d0dfd1a2d3af596dee6e67bfc8ba8d176.exe 99328  9e76d8b06633a335af05901e4a437f89 
6d5d50b05ddbea173634225dd416377bcdcf6a1f28e34616bb61233b96d8a0ea.exe 99328  929e345d21311355764aa4d9c704d5bf 
8ec2bb0e6f544d9683aa0bf5aec96fa355b0eb75961970f76faa3ae515ebd061.exe 99328  a327b27d04dd5476783c9b04de782c19 
9ada1528f2d4074a375d4ad906b1c03ecc1bc634d2b1a9ee1819773722180fc6.exe 99328  7ed6d8e23f20aa094eeedb7bbbd49c9d 
1857dde71057da2e7ab55e7fd4d1df67a1a5da7d4787ae5a1f0227387c995520.exe 99328  9d33612b780ca97a13d45bae25a14f4b 
9d09cbf87b310a7154ca4f9c062401236c3e3cb9e66c0974ed154f2fb95f8083.exe 1024  d1ce129863e386ce0d237ed8065e347d 
3693c99c14d11721a2938014381a58822622eec3a3bc6418d352e05cadc71754.exe 99328  a130800342030cba266759fb43a78574 
6d93accd4fb8a26c3d33480555c83e6c.exe 66561  6d93accd4fb8a26c3d33480555c83e6c 
7bddda3477bda7ec0af43df2f35ffa1d32e2efb53f558f8c93af55ddf8f1b140.exe 33792  fcf8f357db1be846cd43308e3a6b1f03 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware